cve/2021/CVE-2021-24748.md

18 lines
758 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-24748](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24748)
![](https://img.shields.io/static/v1?label=Product&message=Email%20Before%20Download&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=6.8%3C%206.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The Email Before Download WordPress plugin before 6.8 does not properly validate and escape the order and orderby GET parameters before using them in SQL statements, leading to authenticated SQL injection issues
### POC
#### Reference
- https://wpscan.com/vulnerability/a8625b84-337d-4c4d-a698-73e59d1f8ee1
#### Github
No PoCs found on GitHub currently.