Vulnerabilities (CVE)

Filtered by CWE-89
Total 15175 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-24748 1 Mandsconsulting 1 Email Before Download 2024-11-21 6.5 MEDIUM 8.8 HIGH
The Email Before Download WordPress plugin before 6.8 does not properly validate and escape the order and orderby GET parameters before using them in SQL statements, leading to authenticated SQL injection issues
CVE-2021-24747 1 Cleverplugins 1 Seo Booster 2024-11-21 6.5 MEDIUM 7.2 HIGH
The SEO Booster WordPress plugin before 3.8 allows for authenticated SQL injection via the "fn_my_ajaxified_dataloader_ajax" AJAX request as the $_REQUEST['order'][0]['dir'] parameter is not properly escaped leading to blind and error-based SQL injections.
CVE-2021-24741 1 Schiocco 1 Support Board - Chat And Help Desk 2024-11-21 7.5 HIGH 9.8 CRITICAL
The Support Board WordPress plugin before 3.3.4 does not escape multiple POST parameters (such as status_code, department, user_id, conversation_id, conversation_status_code, and recipient_id) before using them in SQL statements, leading to SQL injections which are exploitable by unauthenticated users.
CVE-2021-24731 1 Genetechsolutions 1 Pie Register 2024-11-21 7.5 HIGH 9.8 CRITICAL
The Registration Forms – User profile, Content Restriction, Spam Protection, Payment Gateways, Invitation Codes WordPress plugin before 3.7.1.6 does not properly escape user data before using it in a SQL statement in the wp-json/pie/v1/login REST API endpoint, leading to an SQL injection.
CVE-2021-24728 1 Cozmoslabs 1 Membership \& Content Restriction - Paid Member Subscriptions 2024-11-21 6.5 MEDIUM 8.8 HIGH
The Membership & Content Restriction – Paid Member Subscriptions WordPress plugin before 2.4.2 did not sanitise, validate or escape its order and orderby parameters before using them in SQL statement, leading to Authenticated SQL Injections in the Members and Payments pages.
CVE-2021-24727 1 Stopbadbots 1 Block And Stop Bad Bots 2024-11-21 6.5 MEDIUM 8.8 HIGH
The StopBadBots WordPress plugin before 6.60 did not validate or escape the order and orderby GET parameter in some of its admin dashboard pages, leading to Authenticated SQL Injections
CVE-2021-24726 1 Wpsimplebookingcalendar 1 Wp Simple Booking Calendar 2024-11-21 6.5 MEDIUM 8.8 HIGH
The WP Simple Booking Calendar WordPress plugin before 2.0.6 did not escape, validate or sanitise the orderby parameter in its Search Calendars action, before using it in a SQL statement, leading to an authenticated SQL injection issue
CVE-2021-24704 1 Orange-form Project 1 Orange-form 2024-11-21 6.8 MEDIUM 8.8 HIGH
In the Orange Form WordPress plugin through 1.0, the process_bulk_action() function in "admin/orange-form-email.php" performs an unprepared SQL query with an unsanitized parameter ($id). Only admin can access the page that invokes the function, but because of lack of CSRF protection, it is actually exploitable and could allow attackers to make a logged in admin delete arbitrary posts for example
CVE-2021-24669 1 Feataholic 1 Maz Loader 2024-11-21 6.5 MEDIUM 8.8 HIGH
The MAZ Loader – Preloader Builder for WordPress plugin before 1.3.3 does not validate or escape the loader_id parameter of the mzldr shortcode, which allows users with a role as low as Contributor to perform SQL injection.
CVE-2021-24666 1 Podlove 1 Podlove Podcast Publisher 2024-11-21 6.8 MEDIUM 9.8 CRITICAL
The Podlove Podcast Publisher WordPress plugin before 3.5.6 contains a 'Social & Donations' module (not activated by default), which adds the rest route '/services/contributor/(?P<id>[\d]+), takes an 'id' and 'category' parameters as arguments. Both parameters can be used for the SQLi.
CVE-2021-24662 1 Game-server-status Project 1 Game-server-status 2024-11-21 6.5 MEDIUM 7.2 HIGH
The Game Server Status WordPress plugin through 1.0 does not validate or escape the server_id parameter before using it in SQL statement, leading to an Authenticated SQL Injection in an admin page
CVE-2021-24651 1 Ays-pro 1 Poll Maker 2024-11-21 5.0 MEDIUM 7.5 HIGH
The Poll Maker WordPress plugin before 3.4.2 allows unauthenticated users to perform SQL injection via the ays_finish_poll AJAX action. While the result is not disclosed in the response, it is possible to use a timing attack to exfiltrate data such as password hash.
CVE-2021-24631 1 Unlimited Popups Project 1 Unlimited Popups 2024-11-21 6.5 MEDIUM 8.8 HIGH
The Unlimited PopUps WordPress plugin through 4.5.3 does not sanitise or escape the did GET parameter before using it in a SQL statement, available to users as low as editor, leading to an authenticated SQL Injection
CVE-2021-24630 1 Schreikasten Project 1 Schreikasten 2024-11-21 6.5 MEDIUM 8.8 HIGH
The Schreikasten WordPress plugin through 0.14.18 does not sanitise or escape the id GET parameter before using it in SQL statements in the comments dashboard from various actions, leading to authenticated SQL Injections which can be exploited by users as low as author
CVE-2021-24629 1 Post Content Xmlrpc Project 1 Post Content Xmlrpc 2024-11-21 6.5 MEDIUM 7.2 HIGH
The Post Content XMLRPC WordPress plugin through 1.0 does not sanitise or escape multiple GET/POST parameters before using them in SQL statements in the admin dashboard, leading to an authenticated SQL Injections
CVE-2021-24628 1 Wow-company 1 Wow Forms 2024-11-21 6.5 MEDIUM 7.2 HIGH
The Wow Forms WordPress plugin through 3.1.3 does not sanitise or escape a 'did' GET parameter before using it in a SQL statement, when deleting a form in the admin dashboard, leading to an authenticated SQL injection
CVE-2021-24627 1 G Auto-hyperlink Project 1 G Auto-hyperlink 2024-11-21 6.5 MEDIUM 7.2 HIGH
The G Auto-Hyperlink WordPress plugin through 1.0.1 does not sanitise or escape an 'id' GET parameter before using it in a SQL statement, to select data to be displayed in the admin dashboard, leading to an authenticated SQL injection
CVE-2021-24626 1 Chameleon Css Project 1 Chameleon Css 2024-11-21 6.5 MEDIUM 8.8 HIGH
The Chameleon CSS WordPress plugin through 1.2 does not have any CSRF and capability checks in all its AJAX calls, allowing any authenticated user, such as subscriber to call them and perform unauthorised actions. One of AJAX call, remove_css, also does not sanitise or escape the css_id POST parameter before using it in a SQL statement, leading to a SQL Injection
CVE-2021-24625 1 Web-dorado 1 Spidercatalog 2024-11-21 6.5 MEDIUM 7.2 HIGH
The SpiderCatalog WordPress plugin through 1.7.3 does not sanitise or escape the 'parent' and 'ordering' parameters from the admin dashboard before using them in a SQL statement, leading to a SQL injection when adding a category
CVE-2021-24606 1 Offshorewebmaster 1 Availability Calendar 2024-11-21 6.5 MEDIUM 8.8 HIGH
The Availability Calendar WordPress plugin before 1.2.1 does not escape the category attribute from its shortcode before using it in a SQL statement, leading to a SQL Injection issue, which can be exploited by any user able to add shortcode to posts/pages, such as contributor+