The Paytm – Donation Plugin WordPress plugin through 1.3.2 does not sanitise, validate or escape the id GET parameter before using it in a SQL statement when deleting donations, leading to an authenticated SQL injection issue
References
Link | Resource |
---|---|
https://codevigilant.com/disclosure/2021/wp-plugin-wp-paytm-pay/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/f2842ac8-76fa-4490-aa0c-5f2b07ecf2ad | Exploit Third Party Advisory |
https://codevigilant.com/disclosure/2021/wp-plugin-wp-paytm-pay/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/f2842ac8-76fa-4490-aa0c-5f2b07ecf2ad | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://codevigilant.com/disclosure/2021/wp-plugin-wp-paytm-pay/ - Exploit, Third Party Advisory | |
References | () https://wpscan.com/vulnerability/f2842ac8-76fa-4490-aa0c-5f2b07ecf2ad - Exploit, Third Party Advisory |
Information
Published : 2021-08-23 12:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24554
Mitre link : CVE-2021-24554
CVE.ORG link : CVE-2021-24554
JSON object : View
Products Affected
freelancetoindia
- paytm-pay
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')