CVE-2020-27481: WordPress vulnerability

An unauthenticated SQL Injection vulnerability in Good Layers LMS Plugin <= 2.1.4 exists due to the usage of "wp_ajax_nopriv" call in WordPress, which allows any unauthenticated user to get access to the function "gdlr_lms_cancel_booking" where POST Parameter "id" was sent straight into SQL query without sanitization.

How to mitigate CVE-2020-27481

Time needed: 5 minutes.

Follow the instructions, as they will assist you in mitigating the WordPress vulnerability that been reported in CVE-2020-27481.

  1. Install the latest version of WordPress

    Navigate to the official WordPress website and download the latest version of WordPress. The latest version contains the CVE-2020-27481 fix.
    Update to the latest version

  2. Perform a vulnerability assessment

    Perform a scan on your WordPress environment(s), and check for vulnerabilities. Verify if CVE-2020-27481 has been mitigated.

  3. Utilize the references

    The CVE-2020-27481 references have been provided for a reason. Utilize these references and make sure that you are correctly informed.

References

  • gist.github.com/0xx7/a7aaa8b0515139cf7e30c808c8d54070
  • Share this information