CVE-2021-24915

The Contest Gallery WordPress plugin before 13.1.0.6 does not have capability checks and does not sanitise or escape the cg-search-user-name-original parameter before using it in a SQL statement when exporting users from a gallery, which could allow unauthenticated to perform SQL injections attacks, as well as get the list of all users registered on the blog, including their username and email address
Configurations

Configuration 1 (hide)

cpe:2.3:a:contest_gallery:contest_gallery:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:54

Type Values Removed Values Added
References () https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917 - Exploit, Third Party Advisory () https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917 - Exploit, Third Party Advisory
References () https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac - Exploit, Third Party Advisory

30 Nov 2021, 13:32

Type Values Removed Values Added
References (MISC) https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac - (MISC) https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac - Exploit, Third Party Advisory
References (MISC) https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917 - (MISC) https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CPE cpe:2.3:a:contest_gallery:contest_gallery:*:*:*:*:*:wordpress:*:*
CWE CWE-862 CWE-89

29 Nov 2021, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-11-29 09:15

Updated : 2024-11-21 05:54


NVD link : CVE-2021-24915

Mitre link : CVE-2021-24915

CVE.ORG link : CVE-2021-24915


JSON object : View

Products Affected

contest_gallery

  • contest_gallery
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')