The edit functionality in the MicroCopy WordPress plugin through 1.1.0 makes a get request to fetch the related option. The id parameter used is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
References
Link | Resource |
---|---|
https://codevigilant.com/disclosure/2021/wp-plugin-microcopy/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/2edab2b0-d4fd-4d50-aca0-2a1b7b37c23d | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2021-09-20T10:06:00
Updated: 2021-09-20T10:06:00
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24397
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-09-20T10:15:07.873
Modified: 2021-09-29T02:13:07.693
Link: CVE-2021-24397
JSON object: View
Redhat Information
No data.
CWE