The Broken Link Manager WordPress plugin through 0.6.5 does not sanitise, validate or escape the url GET parameter before using it in a SQL statement when retrieving an URL to edit, leading to an authenticated SQL injection issue
References
Link | Resource |
---|---|
https://codevigilant.com/disclosure/2021/wp-plugin-broken-link-manager/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/1bf65448-689c-474d-a566-c9b6797d3e4a | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2021-08-23T11:10:04
Updated: 2021-08-23T11:10:04
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24550
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-08-23T12:15:09.627
Modified: 2021-08-26T19:20:54.450
Link: CVE-2021-24550
JSON object: View
Redhat Information
No data.
CWE