The id GET parameter of one of the Video Embed WordPress plugin through 1.0's page (available via forced browsing) is not sanitised, validated or escaped before being used in a SQL statement, allowing low privilege users, such as subscribers, to perform SQL injection.
References
Link | Resource |
---|---|
https://codevigilant.com/disclosure/2021/wp-plugin-video-embed-box/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/a8fd8dd4-5b5e-462e-8dae-065d5e2d003a | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-06-07 11:15
Updated : 2021-07-15 20:06
NVD link : CVE-2021-24337
Mitre link : CVE-2021-24337
CVE.ORG link : CVE-2021-24337
JSON object : View
Products Affected
video-embed-box_project
- video-embed-box
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')