### [CVE-2019-20361](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20361) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 4.3.1, that allowed SQL statements to be passed to the database in the hash parameter (a blind SQL injection vulnerability). ### POC #### Reference - http://packetstormsecurity.com/files/158568/WordPress-Email-Subscribers-And-Newsletters-4.2.2-SQL-Injection.html - http://packetstormsecurity.com/files/158568/WordPress-Email-Subscribers-And-Newsletters-4.2.2-SQL-Injection.html - https://wpvulndb.com/vulnerabilities/9947 - https://wpvulndb.com/vulnerabilities/9947 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Shamsuzzaman321/Wordpress-Exploit-AiO-Package - https://github.com/jerrylewis9/CVE-2019-20361-EXPLOIT