Vulnerabilities (CVE)

Filtered by CWE-89
Total 14524 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-24398 1 Webpsilon 1 Responsive 3d Slider 2024-11-21 6.5 MEDIUM 7.2 HIGH
The Add new scene functionality in the Responsive 3D Slider WordPress plugin through 1.2 uses an id parameter which is not sanitised, escaped or validated before being inserted to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query is ran twice.
CVE-2021-24397 1 Activemedia 1 Microcopy 2024-11-21 6.5 MEDIUM 7.2 HIGH
The edit functionality in the MicroCopy WordPress plugin through 1.1.0 makes a get request to fetch the related option. The id parameter used is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
CVE-2021-24396 1 Bestiaweb 1 Gseor 2024-11-21 6.5 MEDIUM 7.2 HIGH
A pageid GET parameter of the GSEOR – WordPress SEO Plugin WordPress plugin through 1.3 is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
CVE-2021-24395 1 Geekwebsolution 1 Embed Youtube Video 2024-11-21 6.5 MEDIUM 7.2 HIGH
The editid GET parameter of the Embed Youtube Video WordPress plugin through 1.0 is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
CVE-2021-24394 1 Easy Testimonial Manager Project 1 Easy Testimonial Manager 2024-11-21 6.5 MEDIUM 7.2 HIGH
An id GET parameter of the Easy Testimonial Manager WordPress plugin through 1.2.0 is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection
CVE-2021-24393 1 Comment Highlighter Project 1 Comment Highlighter 2024-11-21 6.5 MEDIUM 7.2 HIGH
A c GET parameter of the Comment Highlighter WordPress plugin through 0.13 is not properly sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
CVE-2021-24392 1 Swiftcrm 1 Club-management-software 2024-11-21 6.5 MEDIUM 7.2 HIGH
An id GET parameter of the WordPress Membership SwiftCloud.io WordPress plugin through 1.0 is not properly sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
CVE-2021-24391 1 Cashtomer Project 1 Cashtomer 2024-11-21 6.5 MEDIUM 8.8 HIGH
An editid GET parameter of the Cashtomer WordPress plugin through 1.0.0 is not properly sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
CVE-2021-24390 1 Alipay Project 1 Alipay 2024-11-21 6.5 MEDIUM 7.2 HIGH
A proid GET parameter of the WordPress支付宝Alipay|财付通Tenpay|贝宝PayPal集成插件 WordPress plugin through 3.7.2 is not sanitised, properly escaped or validated before inserting to a SQL statement not delimited by quotes, leading to SQL injection.
CVE-2021-24385 1 Ninjateam 1 Filebird 2024-11-21 7.5 HIGH 9.8 CRITICAL
The Filebird Plugin 4.7.3 introduced a SQL injection vulnerability as it is making SQL queries without escaping user input data from a HTTP post request. This is a major vulnerability as the user input is not escaped and passed directly to the get_col function and it allows SQL injection. The Rest API endpoint which invokes this function also does not have any required permissions/authentication and can be accessed by an anonymous user.
CVE-2021-24361 1 Ayecode 1 Location Manager 2024-11-21 7.5 HIGH 9.8 CRITICAL
In the Location Manager WordPress plugin before 2.1.0.10, the AJAX action gd_popular_location_list did not properly sanitise or validate some of its POST parameters, which are then used in a SQL statement, leading to unauthenticated SQL Injection issues.
CVE-2021-24360 1 Kohsei-works 1 Yes\/no Chart 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
The Yes/No Chart WordPress plugin before 1.0.12 did not sanitise its sid shortcode parameter before using it in a SQL statement, allowing medium privilege users (contributor+) to perform Blind SQL Injection attacks
CVE-2021-24348 1 Wow-estore 1 Side Menu 2024-11-21 6.5 MEDIUM 7.2 HIGH
The menu delete functionality of the Side Menu – add fixed side buttons WordPress plugin before 3.1.5, available to Administrator users takes the did GET parameter and uses it into an SQL statement without proper sanitisation, validation or escaping, therefore leading to a SQL Injection issue
CVE-2021-24345 1 Sendit Project 1 Sendit 2024-11-21 6.0 MEDIUM 6.6 MEDIUM
The page lists-management feature of the Sendit WP Newsletter WordPress plugin through 2.5.1, available to Administrator users does not sanitise, validate or escape the id_lista POST parameter before using it in SQL statement, therefore leading to Blind SQL Injection.
CVE-2021-24341 1 Xllentech 1 English Islamic Calendar 2024-11-21 6.5 MEDIUM 8.8 HIGH
When deleting a date in the Xllentech English Islamic Calendar WordPress plugin before 2.6.8, the year_number and month_number POST parameters are not sanitised, escaped or validated before being used in a SQL statement, leading to SQL injection.
CVE-2021-24340 1 Veronalabs 1 Wp Statistics 2024-11-21 5.0 MEDIUM 7.5 HIGH
The WP Statistics WordPress plugin before 13.0.8 relied on using the WordPress esc_sql() function on a field not delimited by quotes and did not first prepare the query. Additionally, the page, which should have been accessible to administrator only, was also available to any visitor, including unauthenticated ones.
CVE-2021-24337 1 Video-embed-box Project 1 Video-embed-box 2024-11-21 6.5 MEDIUM 8.8 HIGH
The id GET parameter of one of the Video Embed WordPress plugin through 1.0's page (available via forced browsing) is not sanitised, validated or escaped before being used in a SQL statement, allowing low privilege users, such as subscribers, to perform SQL injection.
CVE-2021-24336 1 Zavedil 1 Flightlog 2024-11-21 6.5 MEDIUM 7.2 HIGH
The FlightLog WordPress plugin through 3.0.2 does not sanitise, validate or escape various POST parameters before using them a SQL statement, leading to SQL injections exploitable by editor and administrator users
CVE-2021-24321 1 Bold-themes 1 Bello 2024-11-21 7.5 HIGH 9.8 CRITICAL
The Bello - Directory & Listing WordPress theme before 1.6.0 did not sanitise the bt_bb_listing_field_price_range_to, bt_bb_listing_field_now_open, bt_bb_listing_field_my_lng, listing_list_view and bt_bb_listing_field_my_lat parameters before using them in a SQL statement, leading to SQL Injection issues
CVE-2021-24314 1 Boostifythemes 1 Goto 2024-11-21 7.5 HIGH 9.8 CRITICAL
The Goto WordPress theme before 2.1 did not sanitise, validate of escape the keywords GET parameter from its listing page before using it in a SQL statement, leading to an Unauthenticated SQL injection issue