Vulnerabilities (CVE)

Filtered by CWE-89
Total 14524 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-24758 1 Email Log Project 1 Email Log 2024-11-21 6.5 MEDIUM 8.8 HIGH
The Email Log WordPress plugin before 2.4.7 does not properly validate, sanitise and escape the "orderby" and "order" GET parameters before using them in SQL statement in the admin dashboard, leading to SQL injections
CVE-2021-24755 1 Mycred 1 Mycred 2024-11-21 6.5 MEDIUM 8.8 HIGH
The myCred WordPress plugin before 2.3 does not validate or escape the fields parameter before using it in a SQL statement, leading to an SQL injection exploitable by any authenticated user
CVE-2021-24754 1 Mainwp 1 Mainwp Child Reports 2024-11-21 6.5 MEDIUM 7.2 HIGH
The MainWP Child Reports WordPress plugin before 2.0.8 does not validate or sanitise the order parameter before using it in a SQL statement in the admin dashboard, leading to an SQL injection issue
CVE-2021-24753 1 Starfish 1 Rich Review 2024-11-21 6.5 MEDIUM 7.2 HIGH
The Rich Reviews by Starfish WordPress plugin before 1.9.6 does not properly validate the orderby GET parameter of the pending reviews page before using it in a SQL statement, leading to an authenticated SQL injection issue
CVE-2021-24750 1 Wp Visitor Statistics \(real Time Traffic\) Project 1 Wp Visitor Statistics \(real Time Traffic\) 2024-11-21 6.5 MEDIUM 8.8 HIGH
The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks
CVE-2021-24748 1 Mandsconsulting 1 Email Before Download 2024-11-21 6.5 MEDIUM 8.8 HIGH
The Email Before Download WordPress plugin before 6.8 does not properly validate and escape the order and orderby GET parameters before using them in SQL statements, leading to authenticated SQL injection issues
CVE-2021-24747 1 Cleverplugins 1 Seo Booster 2024-11-21 6.5 MEDIUM 7.2 HIGH
The SEO Booster WordPress plugin before 3.8 allows for authenticated SQL injection via the "fn_my_ajaxified_dataloader_ajax" AJAX request as the $_REQUEST['order'][0]['dir'] parameter is not properly escaped leading to blind and error-based SQL injections.
CVE-2021-24741 1 Schiocco 1 Support Board - Chat And Help Desk 2024-11-21 7.5 HIGH 9.8 CRITICAL
The Support Board WordPress plugin before 3.3.4 does not escape multiple POST parameters (such as status_code, department, user_id, conversation_id, conversation_status_code, and recipient_id) before using them in SQL statements, leading to SQL injections which are exploitable by unauthenticated users.
CVE-2021-24731 1 Genetechsolutions 1 Pie Register 2024-11-21 7.5 HIGH 9.8 CRITICAL
The Registration Forms – User profile, Content Restriction, Spam Protection, Payment Gateways, Invitation Codes WordPress plugin before 3.7.1.6 does not properly escape user data before using it in a SQL statement in the wp-json/pie/v1/login REST API endpoint, leading to an SQL injection.
CVE-2021-24728 1 Cozmoslabs 1 Membership \& Content Restriction - Paid Member Subscriptions 2024-11-21 6.5 MEDIUM 8.8 HIGH
The Membership & Content Restriction – Paid Member Subscriptions WordPress plugin before 2.4.2 did not sanitise, validate or escape its order and orderby parameters before using them in SQL statement, leading to Authenticated SQL Injections in the Members and Payments pages.
CVE-2021-24727 1 Stopbadbots 1 Block And Stop Bad Bots 2024-11-21 6.5 MEDIUM 8.8 HIGH
The StopBadBots WordPress plugin before 6.60 did not validate or escape the order and orderby GET parameter in some of its admin dashboard pages, leading to Authenticated SQL Injections
CVE-2021-24726 1 Wpsimplebookingcalendar 1 Wp Simple Booking Calendar 2024-11-21 6.5 MEDIUM 8.8 HIGH
The WP Simple Booking Calendar WordPress plugin before 2.0.6 did not escape, validate or sanitise the orderby parameter in its Search Calendars action, before using it in a SQL statement, leading to an authenticated SQL injection issue
CVE-2021-24704 1 Orange-form Project 1 Orange-form 2024-11-21 6.8 MEDIUM 8.8 HIGH
In the Orange Form WordPress plugin through 1.0, the process_bulk_action() function in "admin/orange-form-email.php" performs an unprepared SQL query with an unsanitized parameter ($id). Only admin can access the page that invokes the function, but because of lack of CSRF protection, it is actually exploitable and could allow attackers to make a logged in admin delete arbitrary posts for example
CVE-2021-24669 1 Feataholic 1 Maz Loader 2024-11-21 6.5 MEDIUM 8.8 HIGH
The MAZ Loader – Preloader Builder for WordPress plugin before 1.3.3 does not validate or escape the loader_id parameter of the mzldr shortcode, which allows users with a role as low as Contributor to perform SQL injection.
CVE-2021-24666 1 Podlove 1 Podlove Podcast Publisher 2024-11-21 6.8 MEDIUM 9.8 CRITICAL
The Podlove Podcast Publisher WordPress plugin before 3.5.6 contains a 'Social & Donations' module (not activated by default), which adds the rest route '/services/contributor/(?P<id>[\d]+), takes an 'id' and 'category' parameters as arguments. Both parameters can be used for the SQLi.
CVE-2021-24662 1 Game-server-status Project 1 Game-server-status 2024-11-21 6.5 MEDIUM 7.2 HIGH
The Game Server Status WordPress plugin through 1.0 does not validate or escape the server_id parameter before using it in SQL statement, leading to an Authenticated SQL Injection in an admin page
CVE-2021-24651 1 Ays-pro 1 Poll Maker 2024-11-21 5.0 MEDIUM 7.5 HIGH
The Poll Maker WordPress plugin before 3.4.2 allows unauthenticated users to perform SQL injection via the ays_finish_poll AJAX action. While the result is not disclosed in the response, it is possible to use a timing attack to exfiltrate data such as password hash.
CVE-2021-24631 1 Unlimited Popups Project 1 Unlimited Popups 2024-11-21 6.5 MEDIUM 8.8 HIGH
The Unlimited PopUps WordPress plugin through 4.5.3 does not sanitise or escape the did GET parameter before using it in a SQL statement, available to users as low as editor, leading to an authenticated SQL Injection
CVE-2021-24630 1 Schreikasten Project 1 Schreikasten 2024-11-21 6.5 MEDIUM 8.8 HIGH
The Schreikasten WordPress plugin through 0.14.18 does not sanitise or escape the id GET parameter before using it in SQL statements in the comments dashboard from various actions, leading to authenticated SQL Injections which can be exploited by users as low as author
CVE-2021-24629 1 Post Content Xmlrpc Project 1 Post Content Xmlrpc 2024-11-21 6.5 MEDIUM 7.2 HIGH
The Post Content XMLRPC WordPress plugin through 1.0 does not sanitise or escape multiple GET/POST parameters before using them in SQL statements in the admin dashboard, leading to an authenticated SQL Injections