The SendGrid WordPress plugin is vulnerable to authorization bypass via the get_ajax_statistics function found in the ~/lib/class-sendgrid-statistics.php file which allows authenticated users to export statistic for a WordPress multi-site main site, in versions up to and including 1.11.8.
References
Link | Resource |
---|---|
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34629 | Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34629 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34629 - Third Party Advisory |
25 Oct 2022, 16:02
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo |
10 Aug 2021, 13:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:sendgrid:sendgrid:*:*:*:*:*:wordpress:*:* | |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 4.3 |
References | (MISC) https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34629 - Third Party Advisory | |
CWE | CWE-862 |
30 Jul 2021, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-07-30 21:15
Updated : 2024-11-21 06:10
NVD link : CVE-2021-34629
Mitre link : CVE-2021-34629
CVE.ORG link : CVE-2021-34629
JSON object : View
Products Affected
sendgrid
- sendgrid
CWE