First published: Wed Aug 02 2017(Updated: )
The Etoile Ultimate Product Catalog plugin 4.2.11 for WordPress has SQL injection with these wp-admin/admin-ajax.php POST actions: catalogue_update_order list-item, video_update_order video-item, image_update_order list-item, tag_group_update_order list_item, category_products_update_order category-product-item, custom_fields_update_order field-item, categories_update_order category-item, subcategories_update_order subcategory-item, and tags_update_order tag-list-item.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Etoile Web Design Ultimate Product Catalogue | =4.2.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12199 is classified as a medium severity SQL injection vulnerability.
To fix CVE-2017-12199, update the Etoile Ultimate Product Catalog plugin to the latest version or implement input validation to mitigate SQL injection risks.
The impact of CVE-2017-12199 allows attackers to exploit SQL injection vulnerabilities, potentially leading to unauthorized data access.
CVE-2017-12199 affects version 4.2.11 of the Etoile Ultimate Product Catalog plugin for WordPress.
Exploitation of CVE-2017-12199 can often be identified through unusual database queries or errors related to database access in logs.