The Orders functionality in the WordPress Page Contact plugin through 1.0 has an order_id parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. The feature is available to low privilege users such as contributors
References
Link | Resource |
---|---|
https://codevigilant.com/disclosure/2021/wp-plugin-wpagecontact/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/a87040c1-58fc-4bf7-8bfa-0b9712a62ba8 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2021-09-20T10:06:10
Updated: 2021-09-20T10:06:10
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24403
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-09-20T10:15:08.217
Modified: 2021-09-29T02:52:13.747
Link: CVE-2021-24403
JSON object: View
Redhat Information
No data.
CWE