An unauthenticated SQL Injection vulnerability in Good Layers LMS Plugin <= 2.1.4 exists due to the usage of "wp_ajax_nopriv" call in WordPress, which allows any unauthenticated user to get access to the function "gdlr_lms_cancel_booking" where POST Parameter "id" was sent straight into SQL query without sanitization.
How to mitigate CVE-2020-27481
Time needed: 5 minutes.
Follow the instructions, as they will assist you in mitigating the WordPress vulnerability that been reported in CVE-2020-27481.
- Install the latest version of WordPress
Navigate to the official WordPress website and download the latest version of WordPress. The latest version contains the CVE-2020-27481 fix.
- Perform a vulnerability assessment
Perform a scan on your WordPress environment(s), and check for vulnerabilities. Verify if CVE-2020-27481 has been mitigated.
- Utilize the references
The CVE-2020-27481 references have been provided for a reason. Utilize these references and make sure that you are correctly informed.