The QueryWall: Plugn Play Firewall WordPress plugin through 1.1.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Querywall_plug’n_play_firewall | Querywall_plug’n_play_firewall_project | * | 1.1.1 (including) |