cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forlibrary-management-system library-management-system

Direction: ascending
Dec 08, 2024

Library Management System # CVE-2024-8679

CVE, Research URL

CVE-2024-8679

Date
Dec 07, 2024
Research Description
The Library Management System – Manage e-Digital Books Library plugin for WordPress is vulnerable to SQL Injection via the ‘value' parameter of the owt_lib_handler AJAX action in all versions up to, and including, 3.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
max 3.0.0.
Status
vulnerable
Dec 13, 2024

Library Management System # CVE-2024-12406

CVE, Research URL

CVE-2024-12406

Date
Dec 12, 2024
Research Description
The Library Management System – Manage e-Digital Books Library plugin for WordPress is vulnerable to SQL Injection via the 'owt7_borrow_books_id' parameter in all versions up to, and including, 3.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
max 3.0.0.
Status
vulnerable
Nov 10, 2025

Library Management System # CVE-2025-10303

CVE, Research URL

CVE-2025-10303

Date
Oct 15, 2025
Research Description
The Library Management System plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the owt7_library_management_ajax_handler() function in all versions up to, and including, 3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update and manipulate several of the plugin's settings and features.
Affected versions
max 3.1.
Status
vulnerable