CVE-2024-13726

The Coder WordPress plugin through 1.3.4 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:themescoder:themes_coder:*:*:*:*:*:wordpress:*:*

History

21 May 2025, 16:04

Type Values Removed Values Added
CPE cpe:2.3:a:themescoder:themes_coder:*:*:*:*:*:wordpress:*:*
First Time Themescoder themes Coder
Themescoder
CWE CWE-89
References () https://wpscan.com/vulnerability/ec226d22-0c09-4e7c-86ec-b64819089b60/ - () https://wpscan.com/vulnerability/ec226d22-0c09-4e7c-86ec-b64819089b60/ - Exploit, Third Party Advisory

19 Feb 2025, 22:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.9
v2 : unknown
v3 : 8.6

19 Feb 2025, 19:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9
Summary
  • (es) El complemento Coder WordPress hasta la versión 1.3.4 no depura ni escapa correctamente un parámetro antes de usarlo en una declaración SQL a través de una acción AJAX disponible para usuarios no autenticados, lo que genera una inyección SQL.

17 Feb 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-17 06:15

Updated : 2025-05-21 16:04


NVD link : CVE-2024-13726

Mitre link : CVE-2024-13726

CVE.ORG link : CVE-2024-13726


JSON object : View

Products Affected

themescoder

  • themes_coder
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')