Description
The G Auto-Hyperlink WordPress plugin through 1.0.1 does not sanitise or escape an 'id' GET parameter before using it in a SQL statement, to select data to be displayed in the admin dashboard, leading to an authenticated SQL injection
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-11539 | The G Auto-Hyperlink WordPress plugin through 1.0.1 does not sanitise or escape an 'id' GET parameter before using it in a SQL statement, to select data to be displayed in the admin dashboard, leading to an authenticated SQL injection |
References
History
No history.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T19:35:20.233Z
Reserved: 2021-01-14T00:00:00.000Z
Link: CVE-2021-24627
No data.
Status : Modified
Published: 2021-11-08T18:15:08.433
Modified: 2024-11-21T05:53:26.517
Link: CVE-2021-24627
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD