[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f4MaJNAbmu8xrwDGbRuKCLOai6ep5iMG-3KNY-86FBSU":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-1419f089-7656-43a1-aeee-c33eef604c84-ultimate-product-catalogue","ultimate-product-catalog-authenticated-admin-sql-injection","Ultimate Product Catalog \u003C 2.1.1 - Authenticated (Admin+) SQL Injection","The Ultimate Product Catalog plugin for WordPress is vulnerable to generic SQL Injection via the  Catalogue_ID, SubCategory_ID, SingleProduct, & Tag_ID parameters in versions up to, and including, 2.1 due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL queries.  This makes it possible for authenticated attackers, with administrator-level permissions and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.","ultimate-product-catalogue",null,"\u003C=2.1","2.1.1","high",7.2,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","2014-05-28 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F1419f089-7656-43a1-aeee-c33eef604c84?source=api-prod",3527]