Description
The Conversios.io WordPress plugin before 4.6.2 does not sanitise, validate and escape the sync_progressive_data parameter for the tvcajax_product_sync_bantch_wise AJAX action before using it in a SQL statement, allowing any authenticated user to perform SQL injection attacks.
Published: 2022-03-07
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-11864 The Conversios.io WordPress plugin before 4.6.2 does not sanitise, validate and escape the sync_progressive_data parameter for the tvcajax_product_sync_bantch_wise AJAX action before using it in a SQL statement, allowing any authenticated user to perform SQL injection attacks.
History

Wed, 12 Mar 2025 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Conversios
Conversios conversios
CPEs cpe:2.3:a:tatvic:conversios.io:*:*:*:*:*:wordpress:*:* cpe:2.3:a:conversios:conversios:*:*:*:*:*:wordpress:*:*
Vendors & Products Tatvic
Tatvic conversios.io
Conversios
Conversios conversios

Subscriptions

Conversios Conversios
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2024-08-03T19:49:14.363Z

Reserved: 2021-01-14T00:00:00.000Z

Link: CVE-2021-24952

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-03-07T09:15:08.310

Modified: 2025-03-12T14:33:36.913

Link: CVE-2021-24952

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses