← Back to CVEs
CVE-2021-24915
CRITICAL9.8
Description
The Contest Gallery WordPress plugin before 13.1.0.6 does not have capability checks and does not sanitise or escape the cg-search-user-name-original parameter before using it in a SQL statement when exporting users from a gallery, which could allow unauthenticated to perform SQL injections attacks, as well as get the list of all users registered on the blog, including their username and email address
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published11/29/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
contest_gallery:contest_gallery
Weaknesses (CWE)
CWE-89CWE-89
References
https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917(contact@wpscan.com)
https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac(contact@wpscan.com)
https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917(af854a3a-2127-422b-91ae-364da2661108)
https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.