The Filebird Plugin 4.7.3 introduced a SQL injection vulnerability as it is making SQL queries without escaping user input data from a HTTP post request. This is a major vulnerability as the user input is not escaped and passed directly to the get_col function and it allows SQL injection. The Rest API endpoint which invokes this function also does not have any required permissions/authentication and can be accessed by an anonymous user.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: WPScan

Published: 2021-07-12T19:20:50

Updated: 2021-07-12T19:20:50

Reserved: 2021-01-14T00:00:00


Link: CVE-2021-24385

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-07-12T20:15:08.640

Modified: 2021-07-15T14:32:36.640


Link: CVE-2021-24385

JSON object: View

cve-icon Redhat Information

No data.

CWE