The update functionality in the rslider_page uses an rs_id POST parameter which is not validated, sanitised or escaped before being inserted in sql query, therefore leading to SQL injection for users having Administrator role.
References
Link | Resource |
---|---|
https://codevigilant.com/disclosure/2021/wp-plugin-m-vslider/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/8b8e41e8-5a40-4062-b5b7-3b01b1a709ef | Exploit Third Party Advisory |
https://codevigilant.com/disclosure/2021/wp-plugin-m-vslider/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/8b8e41e8-5a40-4062-b5b7-3b01b1a709ef | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://codevigilant.com/disclosure/2021/wp-plugin-m-vslider/ - Exploit, Third Party Advisory | |
References | () https://wpscan.com/vulnerability/8b8e41e8-5a40-4062-b5b7-3b01b1a709ef - Exploit, Third Party Advisory |
Information
Published : 2021-08-23 12:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24557
Mitre link : CVE-2021-24557
CVE.ORG link : CVE-2021-24557
JSON object : View
Products Affected
nimble3
- m-vslider
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')