Vulnerability Description
Multiple SQL injection vulnerabilities in pie-register/pie-register.php in the Pie Register plugin before 2.0.19 for WordPress allow remote administrators to execute arbitrary SQL commands via the (1) select_invitaion_code_bulk_option or (2) invi_del_id parameter in the pie-invitation-codes page to wp-admin/admin.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Genetechsolutions | Pie Register | <= 2.0.18 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/133929/WordPress-Pie-Register-2.0.18-SQL-InExploit
- http://www.securityfocus.com/archive/1/536669/100/0/threaded
- https://github.com/GTSolutions/Pie-Register/blob/2.0.19/readme.txt
- https://wpvulndb.com/vulnerabilities/8213
- http://packetstormsecurity.com/files/133929/WordPress-Pie-Register-2.0.18-SQL-InExploit
- http://www.securityfocus.com/archive/1/536669/100/0/threaded
- https://github.com/GTSolutions/Pie-Register/blob/2.0.19/readme.txt
- https://wpvulndb.com/vulnerabilities/8213
FAQ
What is CVE-2015-7682?
CVE-2015-7682 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Multiple SQL injection vulnerabilities in pie-register/pie-register.php in the Pie Register plugin before 2.0.19 for WordPress allow remote administrators to execute arbitrary SQL commands via the (1)...
How severe is CVE-2015-7682?
CVE-2015-7682 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-7682?
Check the references section above for vendor advisories and patch information. Affected products include: Genetechsolutions Pie Register.