Vulnerability Description
SQL injection vulnerability in feedwordpresssyndicationpage.class.php in the FeedWordPress plugin before 2015.0514 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the link_ids[] parameter in an Update action in the syndication.php page to wp-admin/admin.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Feedwordpress Project | Feedwordpress | <= 2014.0805 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/131974/WordPress-FeedWordPress-2015.0426-SQExploit
- http://seclists.org/fulldisclosure/2015/May/75Exploit
- https://wordpress.org/plugins/feedwordpress/changelog/PatchVendor Advisory
- https://www.exploit-db.com/exploits/37067/Exploit
- http://packetstormsecurity.com/files/131974/WordPress-FeedWordPress-2015.0426-SQExploit
- http://seclists.org/fulldisclosure/2015/May/75Exploit
- https://wordpress.org/plugins/feedwordpress/changelog/PatchVendor Advisory
- https://www.exploit-db.com/exploits/37067/Exploit
FAQ
What is CVE-2015-4018?
CVE-2015-4018 is a vulnerability with a CVSS score of 6.5 (MEDIUM). SQL injection vulnerability in feedwordpresssyndicationpage.class.php in the FeedWordPress plugin before 2015.0514 for WordPress allows remote authenticated users to execute arbitrary SQL commands via...
How severe is CVE-2015-4018?
CVE-2015-4018 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-4018?
Check the references section above for vendor advisories and patch information. Affected products include: Feedwordpress Project Feedwordpress.