cvelist/2021/24xxx/CVE-2021-24628.json
Anthony Singleton 938debeed0 Revert "November 2021 Patch Tuesday"
This reverts commit df296d9e014bf68ef22c0583c98da3fbe42ea316.
2021-11-17 15:47:33 -05:00

81 lines
2.0 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"CVE_data_meta": {
"ID": "CVE-2021-24628",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "Wow Forms <= 3.1.3 - Admin+ SQL Injection"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Wow Forms create any form with custom style",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "3.1.3",
"version_value": "3.1.3"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Wow Forms WordPress plugin through 3.1.3 does not sanitise or escape a 'did' GET parameter before using it in a SQL statement, when deleting a form in the admin dashboard, leading to an authenticated SQL injection"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/d742ab35-4e2d-42a8-bebc-b953b2e10e3c",
"name": "https://wpscan.com/vulnerability/d742ab35-4e2d-42a8-bebc-b953b2e10e3c"
},
{
"refsource": "MISC",
"url": "https://codevigilant.com/disclosure/2021/wp-plugin-mwp-forms/",
"name": "https://codevigilant.com/disclosure/2021/wp-plugin-mwp-forms/"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-89 SQL Injection",
"lang": "eng"
}
]
}
]
},
"credit": [
{
"lang": "eng",
"value": "Shreya Pohekar of Codevigilant Project"
}
],
"source": {
"discovery": "EXTERNAL"
}
}