CVE-2021-25109

The Futurio Extra WordPress plugin before 1.6.3 is affected by a SQL Injection vulnerability that could be used by high privilege users to extract data from the database as well as used to perform Cross-Site Scripting (XSS) against logged in admins by making send open a malicious link.
Configurations

Configuration 1 (hide)

cpe:2.3:a:futuriowp:futurio_extra:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:54

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/36261af9-3b34-4563-af3c-c9e54ae2d581 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/36261af9-3b34-4563-af3c-c9e54ae2d581 - Exploit, Third Party Advisory

22 Feb 2022, 22:31

Type Values Removed Values Added
References (MISC) https://wpscan.com/vulnerability/36261af9-3b34-4563-af3c-c9e54ae2d581 - (MISC) https://wpscan.com/vulnerability/36261af9-3b34-4563-af3c-c9e54ae2d581 - Exploit, Third Party Advisory
CWE CWE-89
CPE cpe:2.3:a:futuriowp:futurio_extra:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 2.7

14 Feb 2022, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-14 12:15

Updated : 2024-11-21 05:54


NVD link : CVE-2021-25109

Mitre link : CVE-2021-25109

CVE.ORG link : CVE-2021-25109


JSON object : View

Products Affected

futuriowp

  • futurio_extra
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')