SQL injection vulnerability in Spooky Login 2.0 through 2.5 allows remote attackers to bypass authentication and gain privileges via the password field.
| Software | From | Fixed in |
|---|---|---|
| outfront / spooky_login | 2.5 | 2.5.x |
| outfront / spooky_login | 2.4 | 2.4.x |
| outfront / spooky_login | 2.1 | 2.1.x |
| outfront / spooky_login | 2.0 | 2.0.x |
| outfront / spooky_login | 2.2 | 2.2.x |
| outfront / spooky_login | 2.3 | 2.3.x |