The SEUR plugin, in its versions prior to 2.5.11, is vulnerable to time-based SQL injection through the use of the ‘id_order’ parameter of the ‘/modules/seur/ajax/saveCodFee.php’ endpoint.CreditsÁngel Heredia PérezDaniel Collado ToméReferenceshttps://www.incibe.es/en/incibe-cert/notices/aviso/sql-injection-vulnerability-seur-plugin