The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'start' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application.
References
Link | Resource |
---|---|
https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/ | Third Party Advisory |
https://wpdatatables.com/help/whats-new-changelog/ | Release Notes Vendor Advisory |
https://wpscan.com/vulnerability/5c98c2d6-d002-4cff-9d6f-633cb3ec6280 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2021-04-12T13:59:17
Updated: 2021-04-12T13:59:17
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24199
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-04-12T14:15:14.930
Modified: 2021-04-13T20:14:43.687
Link: CVE-2021-24199
JSON object: View
Redhat Information
No data.
CWE