CVE-2024-9828

The Taskbuilder WordPress plugin before 3.0.5 does not sanitize user input into the 'load_orders' parameter and uses it in a SQL statement, allowing high privilege users such as admin to perform SQL Injection attacks
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:taskbuilder:taskbuilder:*:*:*:*:*:wordpress:*:*

History

15 May 2025, 15:58

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/eb2d0932-fd47-4aef-9d08-4377c742bb6e/ - () https://wpscan.com/vulnerability/eb2d0932-fd47-4aef-9d08-4377c742bb6e/ - Exploit, Third Party Advisory
CWE CWE-89
CPE cpe:2.3:a:taskbuilder:taskbuilder:*:*:*:*:*:wordpress:*:*
First Time Taskbuilder taskbuilder
Taskbuilder

21 Nov 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-21 11:15

Updated : 2025-05-15 15:58


NVD link : CVE-2024-9828

Mitre link : CVE-2024-9828

CVE.ORG link : CVE-2024-9828


JSON object : View

Products Affected

taskbuilder

  • taskbuilder
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')