CVE-2017-6096

HIGH

Mail-masta - SQL Injection

Title source: rule
STIX 2.1

Description

A SQL injection issue was discovered in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects /inc/lists/view-list.php (Requires authentication to Wordpress admin) with the GET Parameter: filter_list.

Exploits (1)

exploitdb WORKING POC
by Hanley Shun · textwebappsphp
https://www.exploit-db.com/exploits/41438

References (3)

Core 3
Core References
Exploit, Third Party Advisory x_refsource_misc
https://wpvulndb.com/vulnerabilities/8740
Exploit, Third Party Advisory x_refsource_misc
https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin
Exploit, Third Party Advisory, VDB Entry exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/41438/

Scores

CVSS v3 7.2
EPSS 0.0343
EPSS Percentile 87.5%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-89
Status published
Products (1)
mail-masta_project/mail-masta 1.0
Published Feb 21, 2017
Tracked Since Feb 18, 2026