The Email Log WordPress plugin before 2.4.7 does not properly validate, sanitise and escape the "orderby" and "order" GET parameters before using them in SQL statement in the admin dashboard, leading to SQL injections
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/8dd70db4-5845-440d-8b1d-012738abaac2 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-11-17 11:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-24758
Mitre link : CVE-2021-24758
CVE.ORG link : CVE-2021-24758
JSON object : View
Products Affected
email_log_project
- email_log
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')