Description
SQL injection vulnerability in lib/optin/optin_page.php in the Lead Octopus plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the id parameter.
Exploits (1)
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/show/osvdb/109642
Exploit x_refsource_misc
http://packetstormsecurity.com/files/127640/WordPress-Lead-Octopus-Power-SQL-Injection.html
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/68934
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/94912
Scores
EPSS
0.0165
EPSS Percentile
82.1%
Details
CWE
CWE-89
Status
published
Products (1)
leadoctopus/lead_octopus
Published
Aug 07, 2014
Tracked Since
Feb 18, 2026