The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/165433/WordPress-WP-Visitor-Statistics-4.7-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://plugins.trac.wordpress.org/changeset/2622268 | Patch Third Party Advisory |
https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/165433/WordPress-WP-Visitor-Statistics-4.7-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://plugins.trac.wordpress.org/changeset/2622268 | Patch Third Party Advisory |
https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-12-21 09:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24750
Mitre link : CVE-2021-24750
CVE.ORG link : CVE-2021-24750
JSON object : View
Products Affected
wp_visitor_statistics_\(real_time_traffic\)_project
- wp_visitor_statistics_\(real_time_traffic\)
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')