The TrueBooker  WordPress plugin before 1.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
                
            References
                    | Link | Resource | 
|---|---|
| https://wpscan.com/vulnerability/39e79801-6ec7-4579-bc6b-fd7e899733a8/ | Exploit Third Party Advisory | 
Configurations
                    History
                    11 Sep 2024, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-89 | |
| First Time | Themetechmount Themetechmount truebooker | |
| CPE | cpe:2.3:a:themetechmount:truebooker:*:*:*:*:*:wordpress:*:* | |
| References | () https://wpscan.com/vulnerability/39e79801-6ec7-4579-bc6b-fd7e899733a8/ - Exploit, Third Party Advisory | 
09 Sep 2024, 20:35
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.8 | 
09 Sep 2024, 13:03
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
08 Sep 2024, 06:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-09-08 06:15
Updated : 2024-09-11 16:15
NVD link : CVE-2024-6924
Mitre link : CVE-2024-6924
CVE.ORG link : CVE-2024-6924
JSON object : View
Products Affected
                themetechmount
- truebooker
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
