CVE-2015-7517
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
29/08/2017
Last modified:
20/04/2025
Description
Multiple SQL injection vulnerabilities in the Double Opt-In for Download plugin before 2.0.9 for WordPress allow remote attackers to execute arbitrary SQL commands via the ver parameter to (1) class-doifd-download.php or (2) class-doifd-landing-page.php in public/includes/.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:labwebdesigns:double_opt-in_for_download:*:*:*:*:*:wordpress:*:* | 2.0.8 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://permalink.gmane.org/gmane.comp.security.oss.general/18255
- http://www.securityfocus.com/bid/78220
- http://www.vapidlabs.com/advisory.php?v=157
- https://wpvulndb.com/vulnerabilities/8345
- http://permalink.gmane.org/gmane.comp.security.oss.general/18255
- http://www.securityfocus.com/bid/78220
- http://www.vapidlabs.com/advisory.php?v=157
- https://wpvulndb.com/vulnerabilities/8345



