# Depicter 所开发的插件 Slider & Popup Builder 在 3.6.1 版本及之前存在由于 's' 参数导致的未认证用户SQL注入漏洞
## 漏洞概述
Slider & Popup Builder by Depicter 插件中的 's' 参数存在通用型SQL注入漏洞,影响WordPress版本。该漏洞是由于用户提供的参数未能进行充分转义,且未对现有的SQL查询进行足够的准备导致的。
## 影响版本
所有版本至 3.6.1(包括3.6.1)
## 漏洞细节
该漏洞使得未经过身份验证的攻击者能够将额外的SQL查询附加到现有查询中,从而从数据库中提取敏感信息。
## 漏洞影响
未经过身份验证的攻击者可能利用此漏洞注入额外的SQL查询,以获取数据库中的敏感信息。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | The Slider & Popup Builder by Depicter plugin for WordPress is vulnerable to generic SQL Injection via the ‘s' parameter in all versions up to, and including, 3.6.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-2011.yaml | POC详情 |
标题: Slider & Popup Builder by Depicter <= 3.6.1 - Unauthenticated SQL Injection via 's' Parameter -- 🔗来源链接
标签:
神龙速读标题: LeadRepository.php in depicter/trunk/app/src/Database/Repository – WordPress Plugin Repository -- 🔗来源链接
标签:
神龙速读标题: LeadService.php in depicter/trunk/app/src/Services – WordPress Plugin Repository -- 🔗来源链接
标签:
神龙速读标题: LeadsAjaxController.php in depicter/trunk/app/src/Controllers/Ajax – WordPress Plugin Repository -- 🔗来源链接
标签:
神龙速读标题: LeadsAjaxController.php in depicter/trunk/app/src/Controllers/Ajax – WordPress Plugin Repository -- 🔗来源链接
标签:
神龙速读标题: LeadsAjaxController.php in depicter/trunk/app/src/Controllers/Ajax – WordPress Plugin Repository -- 🔗来源链接
标签:
神龙速读标题: Popup and Slider Builder by Depicter – Add Email collecting Popup, Popup Modal, Coupon Popup, Image Slider, Carousel Slider, Post Slider Carousel – WordPress plugin | WordPress.org -- 🔗来源链接
标签:
神龙速读