The WP Email Users WordPress plugin through 1.7.6 does not escape the data_raw parameter in the weu_selected_users_1 AJAX action, available to any authenticated users, allowing them to perform SQL injection attacks.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/0471d2e2-e759-468f-becd-0b062f00b435 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/0471d2e2-e759-468f-becd-0b062f00b435 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/0471d2e2-e759-468f-becd-0b062f00b435 - Exploit, Third Party Advisory |
20 Mar 2022, 03:30
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 8.8 |
CPE | cpe:2.3:a:techspawn:wp-email-users:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://wpscan.com/vulnerability/0471d2e2-e759-468f-becd-0b062f00b435 - Exploit, Third Party Advisory |
14 Mar 2022, 15:51
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-03-14 15:15
Updated : 2024-11-21 05:54
NVD link : CVE-2021-24959
Mitre link : CVE-2021-24959
CVE.ORG link : CVE-2021-24959
JSON object : View
Products Affected
techspawn
- wp-email-users
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')