### [CVE-2021-24741](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24741) ![](https://img.shields.io/static/v1?label=Product&message=Support%20Board&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.3.4%3C%203.3.4%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) ### Description The Support Board WordPress plugin before 3.3.4 does not escape multiple POST parameters (such as status_code, department, user_id, conversation_id, conversation_status_code, and recipient_id) before using them in SQL statements, leading to SQL injections which are exploitable by unauthenticated users. ### POC #### Reference - https://medium.com/@lijohnjefferson/multiple-sql-injection-unauthenticated-in-support-board-v-3-3-3-3e9b4214a4f9 - https://wpscan.com/vulnerability/ccf293ec-7607-412b-b662-5e237b8690ca #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/itsjeffersonli/CVE-2021-24741 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/whoforget/CVE-POC - https://github.com/youwizard/CVE-POC