The Fancy Product Designer WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the ID parameter found in the ~/inc/api/class-view.php file which allows attackers with administrative level permissions to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 4.7.4.
References
Link | Resource |
---|---|
https://support.fancyproductdesigner.com/support/discussions/topics/13000031264 | Release Notes Vendor Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-4134 | Exploit Third Party Advisory |
https://support.fancyproductdesigner.com/support/discussions/topics/13000031264 | Release Notes Vendor Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-4134 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:36
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 7.2 |
References | () https://support.fancyproductdesigner.com/support/discussions/topics/13000031264 - Release Notes, Vendor Advisory | |
References | () https://www.wordfence.com/vulnerability-advisories/#CVE-2021-4134 - Exploit, Third Party Advisory |
Information
Published : 2022-02-16 17:15
Updated : 2024-11-21 06:36
NVD link : CVE-2021-4134
Mitre link : CVE-2021-4134
CVE.ORG link : CVE-2021-4134
JSON object : View
Products Affected
radykal
- fancy_product_designer
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')