The WP Bannerize WordPress plugin is vulnerable to authenticated SQL injection via the id parameter found in the ~/Classes/wpBannerizeAdmin.php file which allows attackers to exfiltrate sensitive information from vulnerable sites. This issue affects versions 2.0.0 - 4.0.2.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/wp-bannerize/trunk/Classes/wpBannerizeAdmin.php#L1681 | Patch Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39351 | Third Party Advisory |
https://plugins.trac.wordpress.org/browser/wp-bannerize/trunk/Classes/wpBannerizeAdmin.php#L1681 | Patch Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39351 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-10-06 16:15
Updated : 2025-02-14 19:15
NVD link : CVE-2021-39351
Mitre link : CVE-2021-39351
CVE.ORG link : CVE-2021-39351
JSON object : View
Products Affected
wp_bannerize_project
- wp_bannerize
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')