Description
WordPress Plugin Comments-wpDiscuz is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. WordPress Plugin Comments-wpDiscuz version 5.3.5 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 5.3.6 or latest
References
https://github.com/asterite3/CVE-2020-13640/blob/master/exploit.py
https://wpdiscuz.com/community/news/security-vulnerability-issue-in-5-3-5-please-udate/
Related Vulnerabilities
OpenSSL Other Vulnerability (CVE-2003-0131)
e107 Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-17081)
Ruby on Rails Improper Input Validation Vulnerability (CVE-2019-5420)
WordPress Plugin Drag and Drop Multiple File Upload-Contact Form 7 Security Bypass (1.3.6.4)
WordPress Plugin Export any WordPress data to XML/CSV Cross-Site Scripting (1.3.5)