"TITLE":"Orange Form <= 1.0 - SQL Injection via CSRF"
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"generator":"WPScan CVE Generator",
"affects":{
"vendor":{
"vendor_data":[
{
"vendor_name":"Unknown",
"product":{
"product_data":[
{
"product_name":"Orange Form",
"version":{
"version_data":[
{
"version_affected":"<=",
"version_name":"1.0",
"version_value":"1.0"
}
]
}
}
]
}
}
]
}
},
"description":{
"description_data":[
{
"lang":"eng",
"value":"In the Orange Form WordPress plugin through 1.0, the process_bulk_action() function in \"admin/orange-form-email.php\" performs an unprepared SQL query with an unsanitized parameter ($id). Only admin can access the page that invokes the function, but because of lack of CSRF protection, it is actually exploitable and could allow attackers to make a logged in admin delete arbitrary posts for example"