Description
The Secure Copy Content Protection and Content Locking WordPress plugin before 2.8.2 does not escape the sccp_id parameter of the ays_sccp_results_export_file AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an SQL injection.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T19:49:14.241Z
Reserved: 2021-01-14T00:00:00.000Z
Link: CVE-2021-24931
No data.
Status : Modified
Published: 2021-12-06T16:15:08.417
Modified: 2024-11-21T05:54:02.007
Link: CVE-2021-24931
No data.
OpenCVE Enrichment
No data.
Weaknesses