The WP Statistics WordPress plugin before 13.0.8 relied on using the WordPress esc_sql() function on a field not delimited by quotes and did not first prepare the query. Additionally, the page, which should have been accessible to administrator only, was also available to any visitor, including unauthenticated ones.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/d2970cfb-0aa9-4516-9a4b-32971f41a19c | Exploit Third Party Advisory |
https://www.wordfence.com/blog/2021/05/over-600000-sites-impacted-by-wp-statistics-patch/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2021-06-07T10:49:50
Updated: 2021-06-07T10:49:50
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24340
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-06-07T11:15:16.677
Modified: 2021-06-14T17:47:59.613
Link: CVE-2021-24340
JSON object: View
Redhat Information
No data.
CWE