CVE-2021-24630

The Schreikasten WordPress plugin through 0.14.18 does not sanitise or escape the id GET parameter before using it in SQL statements in the comments dashboard from various actions, leading to authenticated SQL Injections which can be exploited by users as low as author
Configurations

Configuration 1 (hide)

cpe:2.3:a:schreikasten_project:schreikasten:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:53

Type Values Removed Values Added
References () https://codevigilant.com/disclosure/2021/wp-plugin-schreikasten/ - Exploit, Third Party Advisory () https://codevigilant.com/disclosure/2021/wp-plugin-schreikasten/ - Exploit, Third Party Advisory
References () https://wpscan.com/vulnerability/a0787dae-a4b7-4248-9960-aaffabfaeb9f - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/a0787dae-a4b7-4248-9960-aaffabfaeb9f - Exploit, Third Party Advisory

10 Nov 2021, 18:07

Type Values Removed Values Added
New CVE

Information

Published : 2021-11-08 18:15

Updated : 2024-11-21 05:53


NVD link : CVE-2021-24630

Mitre link : CVE-2021-24630

CVE.ORG link : CVE-2021-24630


JSON object : View

Products Affected

schreikasten_project

  • schreikasten
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')