CVE-2021-24181

The tutor_mark_answer_as_correct AJAX action from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.7.7 was vulnerable to blind and time based SQL injections that could be exploited by students.
Configurations

Configuration 1 (hide)

cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:52

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/d5a00322-7098-4f8d-8e5e-157b63449c17 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/d5a00322-7098-4f8d-8e5e-157b63449c17 - Exploit, Third Party Advisory
References () https://www.wordfence.com/blog/2021/03/several-vulnerabilities-patched-in-tutor-lms-plugin/ - Exploit, Third Party Advisory () https://www.wordfence.com/blog/2021/03/several-vulnerabilities-patched-in-tutor-lms-plugin/ - Exploit, Third Party Advisory

07 Nov 2023, 03:31

Type Values Removed Values Added
Summary The tutor_mark_answer_as_correct AJAX action from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.7.7 was vulnerable to blind and time based SQL injections that could be exploited by students. The tutor_mark_answer_as_correct AJAX action from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.7.7 was vulnerable to blind and time based SQL injections that could be exploited by students.

Information

Published : 2021-04-05 19:15

Updated : 2024-11-21 05:52


NVD link : CVE-2021-24181

Mitre link : CVE-2021-24181

CVE.ORG link : CVE-2021-24181


JSON object : View

Products Affected

themeum

  • tutor_lms
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')