CVE-2021-24748

The Email Before Download WordPress plugin before 6.8 does not properly validate and escape the order and orderby GET parameters before using them in SQL statements, leading to authenticated SQL injection issues
Configurations

Configuration 1 (hide)

cpe:2.3:a:mandsconsulting:email_before_download:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:53

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/a8625b84-337d-4c4d-a698-73e59d1f8ee1 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/a8625b84-337d-4c4d-a698-73e59d1f8ee1 - Exploit, Third Party Advisory

29 Nov 2021, 19:25

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 8.8
References (MISC) https://wpscan.com/vulnerability/a8625b84-337d-4c4d-a698-73e59d1f8ee1 - (MISC) https://wpscan.com/vulnerability/a8625b84-337d-4c4d-a698-73e59d1f8ee1 - Exploit, Third Party Advisory
CPE cpe:2.3:a:mandsconsulting:email_before_download:*:*:*:*:*:wordpress:*:*

29 Nov 2021, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-11-29 09:15

Updated : 2024-11-21 05:53


NVD link : CVE-2021-24748

Mitre link : CVE-2021-24748

CVE.ORG link : CVE-2021-24748


JSON object : View

Products Affected

mandsconsulting

  • email_before_download
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')