WordPress FireStorm Professional Real Estate Plugin 'id' Parameter SQL Injection Vulnerability

An attacker can exploit this issue using a browser.

The following example URI is available:

www.example.com/wp-content/plugins/fs-real-estate-plugin/xml/marker_listings.xml?id=[SQL]


 

Privacy Statement
Copyright 2010, SecurityFocus