{ "schema_version": "1.4.0", "id": "GHSA-r8gp-f9pj-hx94", "modified": "2025-04-12T12:39:17Z", "published": "2022-05-17T04:03:32Z", "aliases": [ "CVE-2014-5389" ], "details": "SQL injection vulnerability in content-audit-schedule.php in the Content Audit plugin before 1.6.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the \"Audited content types\" option in the content-audit page to wp-admin/options-general.php.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5389" }, { "type": "WEB", "url": "https://security.dxw.com/advisories/blind-sqli-vulnerability-in-content-audit-could-allow-a-privileged-attacker-to-exfiltrate-password-hashes" }, { "type": "WEB", "url": "https://wordpress.org/plugins/content-audit/changelog" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/128525/WordPress-Content-Audit-1.6-Blind-SQL-Injection.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2014/Oct/8" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/70214" } ], "database_specific": { "cwe_ids": [ "CWE-89" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-10-06T14:55:00Z" } }