CVE-2008-2510
Upload File Plugin for WordPress - SQL Injection via f_id Parameter
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2008-2510. PoCs published by eserg.ru.
AI-analyzed exploit summary This exploit demonstrates an SQL injection vulnerability in the Upload File plugin for WordPress. It leverages unsanitized input in the 'f_id' parameter to extract user credentials from the 'wp_users' table via a UNION-based SQLi attack.
Description
SQL injection vulnerability in wp-uploadfile.php in the Upload File plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the f_id parameter.
Exploits (1)
This exploit demonstrates an SQL injection vulnerability in the Upload File plugin for WordPress. It leverages unsanitized input in the 'f_id' parameter to extract user credentials from the 'wp_users' table via a UNION-based SQLi attack.