Description
The Check & Log Email WordPress plugin before 1.0.3 does not validate and escape the "order" and "orderby" GET parameters before using them in a SQL statement when viewing logs, leading to SQL injections issues
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-11686 | The Check & Log Email WordPress plugin before 1.0.3 does not validate and escape the "order" and "orderby" GET parameters before using them in a SQL statement when viewing logs, leading to SQL injections issues |
References
History
No history.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T19:42:17.040Z
Reserved: 2021-01-14T00:00:00.000Z
Link: CVE-2021-24774
No data.
Status : Modified
Published: 2021-10-25T14:15:10.713
Modified: 2024-11-21T05:53:44.300
Link: CVE-2021-24774
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD