Description
The ExportFeed WordPress plugin through 2.0.1.0 does not sanitise and escape the product_id POST parameter before using it in a SQL statement, leading to a SQL injection vulnerability exploitable by high privilege users
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-34066 | The ExportFeed WordPress plugin through 2.0.1.0 does not sanitise and escape the product_id POST parameter before using it in a SQL statement, leading to a SQL injection vulnerability exploitable by high privilege users |
References
History
No history.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T17:16:04.256Z
Reserved: 2022-01-21T00:00:00.000Z
Link: CVE-2021-4208
No data.
Status : Modified
Published: 2022-02-21T11:15:09.110
Modified: 2024-11-21T06:37:09.060
Link: CVE-2021-4208
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD