Description
The WP Email Users WordPress plugin through 1.7.6 does not escape the data_raw parameter in the weu_selected_users_1 AJAX action, available to any authenticated users, allowing them to perform SQL injection attacks.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T19:49:13.934Z
Reserved: 2021-01-14T00:00:00.000Z
Link: CVE-2021-24959
No data.
Status : Modified
Published: 2022-03-14T15:15:08.710
Modified: 2024-11-21T05:54:05.177
Link: CVE-2021-24959
No data.
OpenCVE Enrichment
No data.
Weaknesses