The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'start' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application.
References
Link | Resource |
---|---|
https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/ | Third Party Advisory |
https://wpdatatables.com/help/whats-new-changelog/ | Release Notes Vendor Advisory |
https://wpscan.com/vulnerability/5c98c2d6-d002-4cff-9d6f-633cb3ec6280 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-04-12 14:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-24199
Mitre link : CVE-2021-24199
CVE.ORG link : CVE-2021-24199
JSON object : View
Products Affected
tms-outsource
- wpdatatables
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')