The Broken Link Manager WordPress plugin through 0.6.5 does not sanitise, validate or escape the url GET parameter before using it in a SQL statement when retrieving an URL to edit, leading to an authenticated SQL injection issue
References
Link | Resource |
---|---|
https://codevigilant.com/disclosure/2021/wp-plugin-broken-link-manager/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/1bf65448-689c-474d-a566-c9b6797d3e4a | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-08-23 12:15
Updated : 2021-08-26 19:20
NVD link : CVE-2021-24550
Mitre link : CVE-2021-24550
CVE.ORG link : CVE-2021-24550
JSON object : View
Products Affected
broken_link_manager_project
- broken_link_manager
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')