.. / CVE-2020-14092

Exploit for WordPress PayPal Pro <1.1.65 - SQL Injection (CVE-2020-14092)

Description:

WordPress PayPal Pro plugin before 1.1.65 is susceptible to SQL injection via the ‘query’ parameter which allows for any unauthenticated user to perform SQL queries with the results output to a web page in JSON format.

Nuclei Template

View the template here CVE-2020-14092.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-14092.yaml
Copy

References:

https://wordpress.dwbooster.com/forms/payment-form-for-paypal-pro
https://nvd.nist.gov/vuln/detail/CVE-2020-14092
https://wpscan.com/vulnerability/10287
https://wordpress.org/plugins/payment-form-for-paypal-pro/#developers
https://wpvulndb.com/vulnerabilities/10287