CVE-2021-24758

The Email Log WordPress plugin before 2.4.7 does not properly validate, sanitise and escape the "orderby" and "order" GET parameters before using them in SQL statement in the admin dashboard, leading to SQL injections
Configurations

Configuration 1 (hide)

cpe:2.3:a:email_log_project:email_log:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:53

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/8dd70db4-5845-440d-8b1d-012738abaac2 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/8dd70db4-5845-440d-8b1d-012738abaac2 - Exploit, Third Party Advisory

19 Nov 2021, 08:16

Type Values Removed Values Added
References (MISC) https://wpscan.com/vulnerability/8dd70db4-5845-440d-8b1d-012738abaac2 - (MISC) https://wpscan.com/vulnerability/8dd70db4-5845-440d-8b1d-012738abaac2 - Exploit, Third Party Advisory
CPE cpe:2.3:a:email_log_project:email_log:*:*:*:*:*:wordpress:*:*
CWE CWE-89
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 8.8

17 Nov 2021, 13:12

Type Values Removed Values Added
New CVE

Information

Published : 2021-11-17 11:15

Updated : 2024-11-21 05:53


NVD link : CVE-2021-24758

Mitre link : CVE-2021-24758

CVE.ORG link : CVE-2021-24758


JSON object : View

Products Affected

email_log_project

  • email_log
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')