The Futurio Extra WordPress plugin before 1.6.3 is affected by a SQL Injection vulnerability that could be used by high privilege users to extract data from the database as well as used to perform Cross-Site Scripting (XSS) against logged in admins by making send open a malicious link.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/36261af9-3b34-4563-af3c-c9e54ae2d581 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/36261af9-3b34-4563-af3c-c9e54ae2d581 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/36261af9-3b34-4563-af3c-c9e54ae2d581 - Exploit, Third Party Advisory |
Information
Published : 2022-02-14 12:15
Updated : 2024-11-21 05:54
NVD link : CVE-2021-25109
Mitre link : CVE-2021-25109
CVE.ORG link : CVE-2021-25109
JSON object : View
Products Affected
futuriowp
- futurio_extra
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')