CVE-2021-24507

The Astra Pro Addon WordPress plugin before 3.5.2 did not properly sanitise or escape some of the POST parameters from the astra_pagination_infinite and astra_shop_pagination_infinite AJAX action (available to both unauthenticated and authenticated user) before using them in SQL statement, leading to an SQL Injection issues
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:brainstormforce:astra:*:*:*:*:pro:wordpress:*:*

History

17 Aug 2021, 16:41

Type Values Removed Values Added
CWE CWE-89
CPE cpe:2.3:a:brainstormforce:astra:*:*:*:*:pro:wordpress:*:*
References (MISC) https://wpscan.com/vulnerability/a1a0dc0b-c351-4d46-ac9b-b297ce4d251c - (MISC) https://wpscan.com/vulnerability/a1a0dc0b-c351-4d46-ac9b-b297ce4d251c - Exploit, Third Party Advisory
References (MISC) https://wpastra.com/changelog/astra-pro-addon/ - (MISC) https://wpastra.com/changelog/astra-pro-addon/ - Release Notes, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8

09 Aug 2021, 11:39

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-09 10:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-24507

Mitre link : CVE-2021-24507

CVE.ORG link : CVE-2021-24507


JSON object : View

Products Affected

brainstormforce

  • astra
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')