Input validation vulnerability in Sermon Browser 0.43.6

The Sermon Browser plugin for WordPress had an issue in versions before 0.43.6 that made it vulnerable to SQL Injection. This means that an unauthenticated attacker could use the ‘sermon_id’ parameter to add additional SQL queries which could be used to access sensitive information from the database. The vulnerability was caused by insufficient escaping of the user supplied parameter and not enough preparation of the existing SQL query.

Detected in:

Sermon Browser open vulnerable versions: >= * < 0.43.6

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.