Total
16417 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-24844 | 1 Wpaffiliatemanager | 1 Affiliates Manager | 2024-11-21 | 7.2 High |
The Affiliates Manager WordPress plugin before 2.8.7 does not validate the orderby parameter before using it in an SQL statement in the admin dashboard, leading to an SQL Injection issue | ||||
CVE-2021-24835 | 1 Wclovers | 1 Frontend Manager For Woocommerce Along With Bookings Subscription Listings Compatible | 2024-11-21 | 8.8 High |
The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible WordPress plugin before 6.5.12, when used in combination with another WCFM - WooCommerce Multivendor plugin such as WCFM - WooCommerce Multivendor Marketplace, does not escape the withdrawal_vendor parameter before using it in a SQL statement, allowing low privilege users such as Subscribers to perform SQL injection attacks | ||||
CVE-2021-24829 | 1 Wp-buy | 1 Visitor Traffic Real Time Statistics | 2024-11-21 | 8.8 High |
The Visitor Traffic Real Time Statistics WordPress plugin before 3.9 does not validate and escape user input passed to the today_traffic_index AJAX action (available to any authenticated users) before using it in a SQL statement, leading to an SQL injection issue | ||||
CVE-2021-24827 | 1 Asgaros | 1 Asgaros Forum | 2024-11-21 | 9.8 Critical |
The Asgaros Forum WordPress plugin before 1.15.13 does not validate and escape user input when subscribing to a topic before using it in a SQL statement, leading to an unauthenticated SQL injection issue | ||||
CVE-2021-24791 | 1 Draftpress | 1 Header Footer Code Manager | 2024-11-21 | 7.2 High |
The Header Footer Code Manager WordPress plugin before 1.1.14 does not validate and escape the "orderby" and "order" request parameters before using them in a SQL statement when viewing the Snippets admin dashboard, leading to SQL injections | ||||
CVE-2021-24778 | 1 Wpaffiliatefeed | 1 Tradetracker-store | 2024-11-21 | 7.2 High |
The test parameter of the xmlfeed in the Tradetracker-Store WordPress plugin before 4.6.60 is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. | ||||
CVE-2021-24777 | 1 Hotscot | 1 Contact Form | 2024-11-21 | 7.2 High |
The view submission functionality in the Hotscot Contact Form WordPress plugin before 1.3 makes a get request with the sub_id parameter which not sanitised, escaped or validated before inserting to a SQL statement, leading to an SQL injection. | ||||
CVE-2021-24774 | 1 Wpchill | 1 Check \& Log Email | 2024-11-21 | 7.2 High |
The Check & Log Email WordPress plugin before 1.0.3 does not validate and escape the "order" and "orderby" GET parameters before using them in a SQL statement when viewing logs, leading to SQL injections issues | ||||
CVE-2021-24772 | 1 Xwp | 1 Stream | 2024-11-21 | 8.8 High |
The Stream WordPress plugin before 3.8.2 does not sanitise and validate the order GET parameter from the Stream Records admin dashboard before using it in a SQL statement, leading to an SQL injection issue. | ||||
CVE-2021-24769 | 1 Permalink Manager Lite Project | 1 Permalink Manager Lite | 2024-11-21 | 7.2 High |
The Permalink Manager Lite WordPress plugin before 2.2.13.1 does not validate and escape the orderby parameter before using it in a SQL statement in the Permalink Manager page, leading to a SQL Injection | ||||
CVE-2021-24762 | 1 Getperfectsurvey | 1 Perfect Survey | 2024-11-21 | 9.8 Critical |
The Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection. | ||||
CVE-2021-24758 | 1 Email Log Project | 1 Email Log | 2024-11-21 | 8.8 High |
The Email Log WordPress plugin before 2.4.7 does not properly validate, sanitise and escape the "orderby" and "order" GET parameters before using them in SQL statement in the admin dashboard, leading to SQL injections | ||||
CVE-2021-24755 | 1 Mycred | 1 Mycred | 2024-11-21 | 8.8 High |
The myCred WordPress plugin before 2.3 does not validate or escape the fields parameter before using it in a SQL statement, leading to an SQL injection exploitable by any authenticated user | ||||
CVE-2021-24754 | 1 Mainwp | 1 Mainwp Child Reports | 2024-11-21 | 7.2 High |
The MainWP Child Reports WordPress plugin before 2.0.8 does not validate or sanitise the order parameter before using it in a SQL statement in the admin dashboard, leading to an SQL injection issue | ||||
CVE-2021-24753 | 1 Starfish | 1 Rich Review | 2024-11-21 | 7.2 High |
The Rich Reviews by Starfish WordPress plugin before 1.9.6 does not properly validate the orderby GET parameter of the pending reviews page before using it in a SQL statement, leading to an authenticated SQL injection issue | ||||
CVE-2021-24750 | 1 Wp Visitor Statistics \(real Time Traffic\) Project | 1 Wp Visitor Statistics \(real Time Traffic\) | 2024-11-21 | 8.8 High |
The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks | ||||
CVE-2021-24748 | 1 Mandsconsulting | 1 Email Before Download | 2024-11-21 | 8.8 High |
The Email Before Download WordPress plugin before 6.8 does not properly validate and escape the order and orderby GET parameters before using them in SQL statements, leading to authenticated SQL injection issues | ||||
CVE-2021-24747 | 1 Cleverplugins | 1 Seo Booster | 2024-11-21 | 7.2 High |
The SEO Booster WordPress plugin before 3.8 allows for authenticated SQL injection via the "fn_my_ajaxified_dataloader_ajax" AJAX request as the $_REQUEST['order'][0]['dir'] parameter is not properly escaped leading to blind and error-based SQL injections. | ||||
CVE-2021-24741 | 1 Schiocco | 1 Support Board - Chat And Help Desk | 2024-11-21 | 9.8 Critical |
The Support Board WordPress plugin before 3.3.4 does not escape multiple POST parameters (such as status_code, department, user_id, conversation_id, conversation_status_code, and recipient_id) before using them in SQL statements, leading to SQL injections which are exploitable by unauthenticated users. | ||||
CVE-2021-24731 | 1 Genetechsolutions | 1 Pie Register | 2024-11-21 | 9.8 Critical |
The Registration Forms – User profile, Content Restriction, Spam Protection, Payment Gateways, Invitation Codes WordPress plugin before 3.7.1.6 does not properly escape user data before using it in a SQL statement in the wp-json/pie/v1/login REST API endpoint, leading to an SQL injection. |