← Back to CVEs
CVE-2021-24750
HIGH8.8
Description
The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published12/21/2021
Last Modified3/6/2026
Sourcenvd
Honeypot Sightings0
Affected Products
codepress:visitor_statistics
Weaknesses (CWE)
CWE-89CWE-89
References
http://packetstormsecurity.com/files/165433/WordPress-WP-Visitor-Statistics-4.7-SQL-Injection.html(contact@wpscan.com)
https://plugins.trac.wordpress.org/changeset/2622268(contact@wpscan.com)
https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de(contact@wpscan.com)
http://packetstormsecurity.com/files/165433/WordPress-WP-Visitor-Statistics-4.7-SQL-Injection.html(af854a3a-2127-422b-91ae-364da2661108)
https://plugins.trac.wordpress.org/changeset/2622268(af854a3a-2127-422b-91ae-364da2661108)
https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.