The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the agents[] parameter in the set_add_agent_leaves AJAX function before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Supportcandy | Supportcandy | * | 3.1.7 (excluding) |