The options.php file of the WP-Board WordPress plugin through 1.1 beta accepts a postid parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query ran twice.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2021-09-20T10:06:11

Updated: 2024-08-03T19:28:23.928Z

Reserved: 2021-01-14T00:00:00

Link: CVE-2021-24404

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2021-09-20T10:15:08.267

Modified: 2021-09-28T19:54:29.590

Link: CVE-2021-24404

cve-icon Redhat

No data.