The School Management System – WPSchoolPress WordPress plugin before 2.1.10 does not properly sanitize or use prepared statements before using POST variable in SQL queries, leading to SQL injection in multiple actions available to various authenticated users, from simple subscribers/students to teachers and above.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/83c9c3af-9eca-45e0-90d7-edc69e616e6a | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/83c9c3af-9eca-45e0-90d7-edc69e616e6a | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/83c9c3af-9eca-45e0-90d7-edc69e616e6a - Exploit, Third Party Advisory |
10 Nov 2021, 13:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-11-08 18:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24575
Mitre link : CVE-2021-24575
CVE.ORG link : CVE-2021-24575
JSON object : View
Products Affected
igexsolutions
- wpschoolpress
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')