An editid GET parameter of the Cashtomer WordPress plugin through 1.0.0 is not properly sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
References
Link | Resource |
---|---|
https://codevigilant.com/disclosure/2021/wp-plugin-cashtomer/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/0c26ee50-df3d-438a-93bb-faa88b7983af | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2021-09-06T11:09:20
Updated: 2021-09-06T11:09:20
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24391
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-09-06T11:15:07.840
Modified: 2021-09-09T19:48:34.523
Link: CVE-2021-24391
JSON object: View
Redhat Information
No data.
CWE