Vulnerability Description
SQL injection vulnerability in modules/module.ab-testing.php in the Landing Pages plugin before 1.8.5 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the post parameter in an edit delete-variation action to wp-admin/post.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Landing Pages Project | Landing Pages | <= 1.8.4 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/132037/WordPress-Landing-Pages-1.8.4-Cross-Exploit
- http://www.securityfocus.com/bid/74777
- https://wordpress.org/plugins/landing-pages/changelog/PatchVendor Advisory
- https://www.exploit-db.com/exploits/37108/Exploit
- http://packetstormsecurity.com/files/132037/WordPress-Landing-Pages-1.8.4-Cross-Exploit
- http://www.securityfocus.com/bid/74777
- https://wordpress.org/plugins/landing-pages/changelog/PatchVendor Advisory
- https://www.exploit-db.com/exploits/37108/Exploit
FAQ
What is CVE-2015-4064?
CVE-2015-4064 is a vulnerability with a CVSS score of 6.5 (MEDIUM). SQL injection vulnerability in modules/module.ab-testing.php in the Landing Pages plugin before 1.8.5 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the post par...
How severe is CVE-2015-4064?
CVE-2015-4064 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-4064?
Check the references section above for vendor advisories and patch information. Affected products include: Landing Pages Project Landing Pages.