Description
Multiple SQL injection vulnerabilities in includes/Function.php in the Easy2Map plugin before 1.2.5 for WordPress allow remote attackers to execute arbitrary SQL commands via the mapName parameter in an e2m_img_save_map_name action to wp-admin/admin-ajax.php and other unspecified vectors.
Exploits (1)
exploitdb
WORKING POC
by Larry W. Cashdollar · textwebappsphp
https://www.exploit-db.com/exploits/37534
References (6)
Core 6
Core References
Product x_refsource_confirm
https://plugins.trac.wordpress.org/changeset/1191455/easy2map
Exploit exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/37534/
Exploit x_refsource_misc
http://www.vapid.dhs.org/advisory.php?v=131
Exploit mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2015/Jul/18
Patch x_refsource_confirm
https://wordpress.org/plugins/easy2map/changelog/
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/535922/100/0/threaded
Scores
EPSS
0.0556
EPSS Percentile
90.3%
Details
CWE
CWE-89
Status
published
Products (1)
easy2map_project/easy2map
< 1.2.4
Published
Jul 08, 2015
Tracked Since
Feb 18, 2026