cve/2021/CVE-2021-24949.md
2025-09-29 21:09:30 +02:00

19 lines
882 B
Markdown

### [CVE-2021-24949](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24949)
![](https://img.shields.io/static/v1?label=Product&message=The%20Plus%20Addons%20for%20Elementor%20-%20Pro&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=5.0.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.0.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brightgreen)
### Description
The "WP Search Filters" widget of The Plus Addons for Elementor - Pro WordPress plugin before 5.0.7 does not sanitise and escape the option parameter before using it in a SQL statement, which could lead to SQL injection
### POC
#### Reference
- https://wpscan.com/vulnerability/9d7f8ba8-a5d5-4ec3-a48f-5cd4b115e8d5
#### Github
- https://github.com/20142995/nuclei-templates