CVE-2021-24507

The Astra Pro Addon WordPress plugin before 3.5.2 did not properly sanitise or escape some of the POST parameters from the astra_pagination_infinite and astra_shop_pagination_infinite AJAX action (available to both unauthenticated and authenticated user) before using them in SQL statement, leading to an SQL Injection issues
Configurations

Configuration 1 (hide)

cpe:2.3:a:brainstormforce:astra:*:*:*:*:pro:wordpress:*:*

History

21 Nov 2024, 05:53

Type Values Removed Values Added
References () https://wpastra.com/changelog/astra-pro-addon/ - Release Notes, Vendor Advisory () https://wpastra.com/changelog/astra-pro-addon/ - Release Notes, Vendor Advisory
References () https://wpscan.com/vulnerability/a1a0dc0b-c351-4d46-ac9b-b297ce4d251c - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/a1a0dc0b-c351-4d46-ac9b-b297ce4d251c - Exploit, Third Party Advisory

Information

Published : 2021-08-09 10:15

Updated : 2024-11-21 05:53


NVD link : CVE-2021-24507

Mitre link : CVE-2021-24507

CVE.ORG link : CVE-2021-24507


JSON object : View

Products Affected

brainstormforce

  • astra
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')