Total
15172 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-24390 | 1 Alipay Project | 1 Alipay | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
A proid GET parameter of the WordPress???Alipay|???Tenpay|??PayPal???? WordPress plugin through 3.7.2 is not sanitised, properly escaped or validated before inserting to a SQL statement not delimited by quotes, leading to SQL injection. | |||||
CVE-2021-24385 | 1 Ninjateam | 1 Filebird | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The Filebird Plugin 4.7.3 introduced a SQL injection vulnerability as it is making SQL queries without escaping user input data from a HTTP post request. This is a major vulnerability as the user input is not escaped and passed directly to the get_col function and it allows SQL injection. The Rest API endpoint which invokes this function also does not have any required permissions/authentication and can be accessed by an anonymous user. | |||||
CVE-2021-24361 | 1 Ayecode | 1 Location Manager | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
In the Location Manager WordPress plugin before 2.1.0.10, the AJAX action gd_popular_location_list did not properly sanitise or validate some of its POST parameters, which are then used in a SQL statement, leading to unauthenticated SQL Injection issues. | |||||
CVE-2021-24360 | 1 Kohsei-works | 1 Yes\/no Chart | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
The Yes/No Chart WordPress plugin before 1.0.12 did not sanitise its sid shortcode parameter before using it in a SQL statement, allowing medium privilege users (contributor+) to perform Blind SQL Injection attacks | |||||
CVE-2021-24348 | 1 Wow-estore | 1 Side Menu | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The menu delete functionality of the Side Menu – add fixed side buttons WordPress plugin before 3.1.5, available to Administrator users takes the did GET parameter and uses it into an SQL statement without proper sanitisation, validation or escaping, therefore leading to a SQL Injection issue | |||||
CVE-2021-24345 | 1 Sendit Project | 1 Sendit | 2024-11-21 | 6.0 MEDIUM | 6.6 MEDIUM |
The page lists-management feature of the Sendit WP Newsletter WordPress plugin through 2.5.1, available to Administrator users does not sanitise, validate or escape the id_lista POST parameter before using it in SQL statement, therefore leading to Blind SQL Injection. | |||||
CVE-2021-24341 | 1 Xllentech | 1 English Islamic Calendar | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
When deleting a date in the Xllentech English Islamic Calendar WordPress plugin before 2.6.8, the year_number and month_number POST parameters are not sanitised, escaped or validated before being used in a SQL statement, leading to SQL injection. | |||||
CVE-2021-24340 | 1 Veronalabs | 1 Wp Statistics | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
The WP Statistics WordPress plugin before 13.0.8 relied on using the WordPress esc_sql() function on a field not delimited by quotes and did not first prepare the query. Additionally, the page, which should have been accessible to administrator only, was also available to any visitor, including unauthenticated ones. | |||||
CVE-2021-24337 | 1 Video-embed-box Project | 1 Video-embed-box | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
The id GET parameter of one of the Video Embed WordPress plugin through 1.0's page (available via forced browsing) is not sanitised, validated or escaped before being used in a SQL statement, allowing low privilege users, such as subscribers, to perform SQL injection. | |||||
CVE-2021-24336 | 1 Zavedil | 1 Flightlog | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The FlightLog WordPress plugin through 3.0.2 does not sanitise, validate or escape various POST parameters before using them a SQL statement, leading to SQL injections exploitable by editor and administrator users | |||||
CVE-2021-24321 | 1 Bold-themes | 1 Bello | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The Bello - Directory & Listing WordPress theme before 1.6.0 did not sanitise the bt_bb_listing_field_price_range_to, bt_bb_listing_field_now_open, bt_bb_listing_field_my_lng, listing_list_view and bt_bb_listing_field_my_lat parameters before using them in a SQL statement, leading to SQL Injection issues | |||||
CVE-2021-24314 | 1 Boostifythemes | 1 Goto | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The Goto WordPress theme before 2.1 did not sanitise, validate of escape the keywords GET parameter from its listing page before using it in a SQL statement, leading to an Unauthenticated SQL injection issue | |||||
CVE-2021-24303 | 1 Jiangqie | 1 Official Website Mini Program | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
The JiangQie Official Website Mini Program WordPress plugin before 1.1.1 does not escape or validate the id GET parameter before using it in SQL statements, leading to SQL injection issues | |||||
CVE-2021-24295 | 1 Cleantalk | 1 Spam Protection\, Antispam\, Firewall | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset. | |||||
CVE-2021-24285 | 1 Cars-seller-auto-classifieds-script Project | 1 Cars-seller-auto-classifieds-script | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The request_list_request AJAX call of the Car Seller - Auto Classifieds Script WordPress plugin through 2.1.0, available to both authenticated and unauthenticated users, does not sanitise, validate or escape the order_id POST parameter before using it in a SQL statement, leading to a SQL Injection issue. | |||||
CVE-2021-24221 | 1 Expresstech | 1 Quiz And Survey Master | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
The Quiz And Survey Master – Best Quiz, Exam and Survey Plugin for WordPress plugin before 7.1.12 did not sanitise the result_id GET parameter on pages with the [qsm_result] shortcode without id attribute, concatenating it in a SQL statement and leading to an SQL injection. The lowest role allowed to use this shortcode in post or pages being author, such user could gain unauthorised access to the DBMS. If the shortcode (without the id attribute) is embed on a public page or post, then unauthenticated users could exploit the injection. | |||||
CVE-2021-24200 | 1 Tms-outsource | 1 Wpdatatables | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'length' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application. | |||||
CVE-2021-24199 | 1 Tms-outsource | 1 Wpdatatables | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'start' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application. | |||||
CVE-2021-24186 | 1 Themeum | 1 Tutor Lms | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
The tutor_answering_quiz_question/get_answer_by_id function pair from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.8.3 was vulnerable to UNION based SQL injection that could be exploited by students. | |||||
CVE-2021-24185 | 1 Themeum | 1 Tutor Lms | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
The tutor_place_rating AJAX action from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.7.7 was vulnerable to blind and time based SQL injections that could be exploited by students. |