The Stock in & out WordPress plugin through 1.0.4 lacks proper sanitization before passing variables to an SQL request, making it vulnerable to SQL Injection attacks. Users with a role of contributor or higher can exploit this vulnerability.
References
Link | Resource |
---|---|
https://github.com/pang0lin/CVEproject/blob/main/wordpress_Stock-in-and-out_sqli.md | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/f903aadd-17af-4ddf-8635-abb3338ac815 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-08-09 10:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-24520
Mitre link : CVE-2021-24520
CVE.ORG link : CVE-2021-24520
JSON object : View
Products Affected
coderstimes
- out_of_stock_message_for_woocommerce
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')