The WP Fastest Cache WordPress plugin before 0.9.5 does not escape user input in the set_urls_with_terms method before using it in a SQL statement, leading to an SQL injection exploitable by low privilege users such as subscriber
References
Link | Resource |
---|---|
https://jetpack.com/2021/10/14/multiple-vulnerabilities-in-wp-fastest-cache-plugin/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/b2233795-1a32-45fc-9d51-b6bd0a073f5b/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2024-01-16T15:49:39.970Z
Updated: 2024-01-16T15:49:39.970Z
Reserved: 2021-01-14T15:03:46.806Z
Link: CVE-2021-24869
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-01-16T16:15:09.103
Modified: 2024-01-19T15:25:42.380
Link: CVE-2021-24869
JSON object: View
Redhat Information
No data.
CWE