CVE-2013-5673
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
10/09/2013
Last modified:
11/04/2025
Description
SQL injection vulnerability in testimonial.php in the IndiaNIC Testimonial plugin 2.2 for WordPress allows remote attackers to execute arbitrary SQL commands via the custom_query parameter in a testimonial_add action to wp-admin/admin-ajax.php.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:indianic:testimonial_plugin:2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2013-09/0006.html
- http://osvdb.org/96793
- http://packetstormsecurity.com/files/123036
- http://seclists.org/fulldisclosure/2013/Sep/5
- http://seclists.org/oss-sec/2013/q3/531
- http://www.exploit-db.com/exploits/28054
- http://www.securityfocus.com/bid/62108
- https://exchange.xforce.ibmcloud.com/vulnerabilities/86847
- http://archives.neohapsis.com/archives/bugtraq/2013-09/0006.html
- http://osvdb.org/96793
- http://packetstormsecurity.com/files/123036
- http://seclists.org/fulldisclosure/2013/Sep/5
- http://seclists.org/oss-sec/2013/q3/531
- http://www.exploit-db.com/exploits/28054
- http://www.securityfocus.com/bid/62108
- https://exchange.xforce.ibmcloud.com/vulnerabilities/86847