### [CVE-2021-24398](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24398) ![](https://img.shields.io/static/v1?label=Product&message=RESPONSIVE%203D%20SLIDER&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.2%3C%3D%201.2%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) ### Description The Add new scene functionality in the Responsive 3D Slider WordPress plugin through 1.2 uses an id parameter which is not sanitised, escaped or validated before being inserted to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query is ran twice. ### POC #### Reference - https://codevigilant.com/disclosure/2021/wp-plugin-morpheus-slider/ - https://wpscan.com/vulnerability/e6fb2256-0214-4891-b4b7-e4371a1599a5 #### Github No PoCs found on GitHub currently.