Description
The Conversios.io WordPress plugin before 4.6.2 does not sanitise, validate and escape the sync_progressive_data parameter for the tvcajax_product_sync_bantch_wise AJAX action before using it in a SQL statement, allowing any authenticated user to perform SQL injection attacks.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-11864 | The Conversios.io WordPress plugin before 4.6.2 does not sanitise, validate and escape the sync_progressive_data parameter for the tvcajax_product_sync_bantch_wise AJAX action before using it in a SQL statement, allowing any authenticated user to perform SQL injection attacks. |
References
History
Wed, 12 Mar 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Conversios
Conversios conversios |
|
| CPEs | cpe:2.3:a:conversios:conversios:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Tatvic
Tatvic conversios.io |
Conversios
Conversios conversios |
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T19:49:14.363Z
Reserved: 2021-01-14T00:00:00.000Z
Link: CVE-2021-24952
No data.
Status : Modified
Published: 2022-03-07T09:15:08.310
Modified: 2025-03-12T14:33:36.913
Link: CVE-2021-24952
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD