# Exploit Title: WP Email Users – 1.4.1 – Plugin WordPress – Sql Injection # Exploit Author: Lenon Leite # Vendor Homepage: https://wordpress.org/plugins/wp-email-users/ # Software Link: https://wordpress.org/plugins/wp-email-users/ # Contact: http://twitter.com/lenonleite # Website: http://lenonleite.com.br/ # Category: webapps # Version: 1.3.1 # Tested on: Ubuntu 14.04 1 - Description: Type user access: is accessible for any registered user $_REQUEST[‘edit’] is escaped wrong. Attack with Sql Injection http://lenonleite.com.br/blog/2017/01/17/english-wp-email-users-1-4-1-plugin-wordpress-sql-injection/ 2 - Proof of Concept: 1 – Login as regular user (created using wp-login.php?action=register): 2 – Using:
3 - Timeline: 12/01/2016 – Discovered 13/12/2016 – Vendor not finded