Total
14524 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-24628 | 1 Wow-company | 1 Wow Forms | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The Wow Forms WordPress plugin through 3.1.3 does not sanitise or escape a 'did' GET parameter before using it in a SQL statement, when deleting a form in the admin dashboard, leading to an authenticated SQL injection | |||||
CVE-2021-24627 | 1 G Auto-hyperlink Project | 1 G Auto-hyperlink | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The G Auto-Hyperlink WordPress plugin through 1.0.1 does not sanitise or escape an 'id' GET parameter before using it in a SQL statement, to select data to be displayed in the admin dashboard, leading to an authenticated SQL injection | |||||
CVE-2021-24626 | 1 Chameleon Css Project | 1 Chameleon Css | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
The Chameleon CSS WordPress plugin through 1.2 does not have any CSRF and capability checks in all its AJAX calls, allowing any authenticated user, such as subscriber to call them and perform unauthorised actions. One of AJAX call, remove_css, also does not sanitise or escape the css_id POST parameter before using it in a SQL statement, leading to a SQL Injection | |||||
CVE-2021-24625 | 1 Web-dorado | 1 Spidercatalog | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The SpiderCatalog WordPress plugin through 1.7.3 does not sanitise or escape the 'parent' and 'ordering' parameters from the admin dashboard before using them in a SQL statement, leading to a SQL injection when adding a category | |||||
CVE-2021-24606 | 1 Offshorewebmaster | 1 Availability Calendar | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
The Availability Calendar WordPress plugin before 1.2.1 does not escape the category attribute from its shortcode before using it in a SQL statement, leading to a SQL Injection issue, which can be exploited by any user able to add shortcode to posts/pages, such as contributor+ | |||||
CVE-2021-24580 | 1 Wow-estore | 1 Side Menu | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
The Side Menu Lite WordPress plugin before 2.2.6 does not sanitise user input from the List page in the admin dashboard before using it in SQL statement, leading to a SQL Injection issue | |||||
CVE-2021-24575 | 1 Igexsolutions | 1 Wpschoolpress | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
The School Management System – WPSchoolPress WordPress plugin before 2.1.10 does not properly sanitize or use prepared statements before using POST variable in SQL queries, leading to SQL injection in multiple actions available to various authenticated users, from simple subscribers/students to teachers and above. | |||||
CVE-2021-24557 | 1 Nimble3 | 1 M-vslider | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The update functionality in the rslider_page uses an rs_id POST parameter which is not validated, sanitised or escaped before being inserted in sql query, therefore leading to SQL injection for users having Administrator role. | |||||
CVE-2021-24555 | 1 Roosty | 1 Diary-availability-calendar | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
The daac_delete_booking_callback function, hooked to the daac_delete_booking AJAX action, takes the id POST parameter which is passed into the SQL statement without proper sanitisation, validation or escaping, leading to a SQL Injection issue. Furthermore, the ajax action is lacking any CSRF and capability check, making it available to any authenticated user. | |||||
CVE-2021-24554 | 1 Freelancetoindia | 1 Paytm-pay | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The Paytm – Donation Plugin WordPress plugin through 1.3.2 does not sanitise, validate or escape the id GET parameter before using it in a SQL statement when deleting donations, leading to an authenticated SQL injection issue | |||||
CVE-2021-24553 | 1 Timeline Calendar Project | 1 Timeline Calendar | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The Timeline Calendar WordPress plugin through 1.2 does not sanitise, validate or escape the edit GET parameter before using it in a SQL statement when editing events, leading to an authenticated SQL injection issue. Other SQL Injections are also present in the plugin | |||||
CVE-2021-24552 | 1 Simple Events Calendar Project | 1 Simple Events Calendar | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The Simple Events Calendar WordPress plugin through 1.4.0 does not sanitise, validate or escape the event_id POST parameter before using it in a SQL statement when deleting events, leading to an authenticated SQL injection issue | |||||
CVE-2021-24551 | 1 Edit Comments Project | 1 Edit Comments | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The Edit Comments WordPress plugin through 0.3 does not sanitise, validate or escape the jal_edit_comments GET parameter before using it in a SQL statement, leading to a SQL injection issue | |||||
CVE-2021-24550 | 1 Broken Link Manager Project | 1 Broken Link Manager | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The Broken Link Manager WordPress plugin through 0.6.5 does not sanitise, validate or escape the url GET parameter before using it in a SQL statement when retrieving an URL to edit, leading to an authenticated SQL injection issue | |||||
CVE-2021-24521 | 1 Wow-estore | 1 Side Menu | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The Side Menu Lite – add sticky fixed buttons WordPress plugin before 2.2.1 does not properly sanitize input values from the browser when building an SQL statement. Users with the administrator role or permission to manage this plugin could perform an SQL Injection attack. | |||||
CVE-2021-24520 | 1 Coderstimes | 1 Out Of Stock Message For Woocommerce | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
The Stock in & out WordPress plugin through 1.0.4 lacks proper sanitization before passing variables to an SQL request, making it vulnerable to SQL Injection attacks. Users with a role of contributor or higher can exploit this vulnerability. | |||||
CVE-2021-24511 | 1 Dpl | 1 Product Feed On Woocommerce | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The fetch_product_ajax functionality in the Product Feed on WooCommerce WordPress plugin before 3.3.1.0 uses a `product_id` POST parameter which is not properly sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. | |||||
CVE-2021-24507 | 1 Brainstormforce | 1 Astra | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The Astra Pro Addon WordPress plugin before 3.5.2 did not properly sanitise or escape some of the POST parameters from the astra_pagination_infinite and astra_shop_pagination_infinite AJAX action (available to both unauthenticated and authenticated user) before using them in SQL statement, leading to an SQL Injection issues | |||||
CVE-2021-24506 | 1 Quantumcloud | 1 Slider Hero | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
The Slider Hero with Animation, Video Background & Intro Maker WordPress plugin before 8.2.7 does not sanitise or escape the id attribute of its hero-button shortcode before using it in a SQL statement, allowing users with a role as low as Contributor to perform SQL injection. | |||||
CVE-2021-24497 | 1 Satollo | 1 Giveaway | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The Giveaway WordPress plugin through 1.2.2 is vulnerable to an SQL Injection issue which allows an administrative user to execute arbitrary SQL commands via the $post_id on the options.php page. |