The multimedial images WordPress plugin through 1.0b does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Admin.CreditsDaniel KrohmerKunal SharmaWPScanReferenceshttps://wpscan.com/vulnerability/cf336783-9959-413d-a5d7-73c7087426d8https://bulletin.iese.de/post/multimedial-images_1-0b