WordPress.Fastest.Cache.Plugin.is_user_admin.SQL.Injection
Description
This indicates an attack attempt to exploit an SQL Injection Vulnerability in WordPress Project Fastest Cache Plugin.
The vulnerability is due to insufficient user input validation in the is_user_admin function. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to the target server. Successful exploitation could result in arbitrary SQL command execution against the target server's database.
Affected Products
WordPress Project Fastest Cache Plugin prior to 1.2.2
Impact
System Compromise: Remote attackers can add, view, delete or modify data in the database of the affected application
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://en-ca.wordpress.org/plugins/wp-fastest-cache/#developers
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |