Security for everyone

CVE-2015-2196 Scanner

Detects 'SQL Injection (SQLi)' vulnerability in Spider Calendar plugin for WordPress affects v. 1.4.9.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2015-2196 Scanner Detail

Spider Event Calendar 1.4.9 is a WordPress plugin used to manage and display events on your website. With this plugin, users can upload, categorize, and schedule events for display. The Spider Calendar plugin also includes widgets and shortcodes for easy integration within a website’s theme.

However, the Spider Event Calendar 1.4.9 contains a critical vulnerability with the CVE-2015-2196 identifier. This vulnerability allows remote attackers to execute arbitrary SQL commands through the “cat_id” parameter in a “spiderbigcalendar_month” action to “wp-admin/admin-ajax.php.” By manipulating the “cat_id” parameter, attackers can inject malicious code into a database and compromise user information and website functionality.

Exploiting this vulnerability can lead to severe consequences such as facilitating unauthorized access, data exposure, and privilege escalation. Attackers can steal usernames, passwords, and credit card information of website visitors and owners. They can also install backdoors or malware on the website's server to wreak havoc, and even launch distributed denial of service attacks.

Thanks to the pro features of, those who read this article can keep their websites protected by quickly identifying and resolving vulnerabilities within their digital assets. Using the platform, users can safeguard against ongoing or potential attacks, detect and remove malware, and access professional support to strengthen their website’s security posture. Protecting your website's digital assets is a vital responsibility for any webmaster. With the right precautions and platform, webmasters can confidently defend their website against potential harm and threats.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture