CVE-2015-2199

Wonderplugin Audio Player < 2.0 - SQL Injection

Title source: rule
STIX 2.1

Description

Multiple SQL injection vulnerabilities in the WonderPlugin Audio Player plugin before 2.1 for WordPress allow (1) remote authenticated users to execute arbitrary SQL commands via the item[id] parameter in a wonderplugin_audio_save_item action to wp-admin/admin-ajax.php or remote administrators to execute arbitrary SQL commands via the itemid parameter in the (2) wonderplugin_audio_show_item, (3) wonderplugin_audio_show_items, or (4) wonderplugin_audio_edit_item page to wp-admin/admin.php.

Exploits (1)

exploitdb WORKING POC
by Kacper Szurek · textwebappsphp
https://www.exploit-db.com/exploits/36086

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/show/osvdb/118508
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/36086
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/show/osvdb/118509
Various Sources x_refsource_misc
http://www.wonderplugin.com/wordpress-audio-player/

Scores

EPSS 0.0184
EPSS Percentile 83.0%

Details

CWE
CWE-89
Status published
Products (1)
wonderplugin/audio_player < 2.0
Published Mar 03, 2015
Tracked Since Feb 18, 2026