Description
The id GET parameter of one of the Video Embed WordPress plugin through 1.0's page (available via forced browsing) is not sanitised, validated or escaped before being used in a SQL statement, allowing low privilege users, such as subscribers, to perform SQL injection.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-11250 | The id GET parameter of one of the Video Embed WordPress plugin through 1.0's page (available via forced browsing) is not sanitised, validated or escaped before being used in a SQL statement, allowing low privilege users, such as subscribers, to perform SQL injection. |
References
History
No history.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T19:28:23.427Z
Reserved: 2021-01-14T00:00:00.000Z
Link: CVE-2021-24337
No data.
Status : Modified
Published: 2021-06-07T11:15:16.607
Modified: 2024-11-21T05:52:52.270
Link: CVE-2021-24337
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD