CVE-2020-24315

Vinoj Cardoza WordPress Poll Plugin v36 and lower executes SQL statement passed in via the pollid POST parameter due to a lack of user input escaping. This allows users who craft specific SQL statements to dump the entire targets database.
References
Link Resource
https://wordpress.org/plugins/cardoza-wordpress-poll/ Release Notes Third Party Advisory
https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ Exploit Third Party Advisory URL Repurposed
Configurations

Configuration 1 (hide)

cpe:2.3:a:wordpress_poll_project:wordpress_poll:*:*:*:*:*:wordpress:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References (MISC) https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ - Exploit, Third Party Advisory (MISC) https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ - Exploit, Third Party Advisory, URL Repurposed

Information

Published : 2020-08-26 14:15

Updated : 2024-02-28 17:47


NVD link : CVE-2020-24315

Mitre link : CVE-2020-24315

CVE.ORG link : CVE-2020-24315


JSON object : View

Products Affected

wordpress_poll_project

  • wordpress_poll
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')