The Conversios.io WordPress plugin before 4.6.2 does not sanitise, validate and escape the sync_progressive_data parameter for the tvcajax_product_sync_bantch_wise AJAX action before using it in a SQL statement, allowing any authenticated user to perform SQL injection attacks.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/cbb8fa9f-1c84-4410-ae86-64cb1771ce78 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2022-03-07T08:16:08
Updated: 2022-03-07T08:16:08
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24952
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-03-07T09:15:08.310
Modified: 2022-03-11T19:26:32.770
Link: CVE-2021-24952
JSON object: View
Redhat Information
No data.
CWE