The Taskbuilder WordPress plugin before 3.0.5 does not sanitize user input into the 'load_orders' parameter and uses it in a SQL statement, allowing high privilege users such as admin to perform SQL Injection attacks
Metrics
Affected Vendors & Products
References
History
Thu, 21 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Taskbuilder
Taskbuilder taskbuilder |
|
CPEs | cpe:2.3:a:taskbuilder:taskbuilder:-:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Taskbuilder
Taskbuilder taskbuilder |
|
Metrics |
cvssV3_1
|
Thu, 21 Nov 2024 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Taskbuilder WordPress plugin before 3.0.5 does not sanitize user input into the 'load_orders' parameter and uses it in a SQL statement, allowing high privilege users such as admin to perform SQL Injection attacks | |
Title | Taskbuilder < 3.0.5 - Admin+ SQL Injection | |
References |
|
MITRE
Status: PUBLISHED
Assigner: WPScan
Published: 2024-11-21T06:00:10.648Z
Updated: 2024-11-21T18:38:17.399Z
Reserved: 2024-10-10T19:20:02.320Z
Link: CVE-2024-9828
Vulnrichment
Updated: 2024-11-21T18:36:00.569Z
NVD
Status : Awaiting Analysis
Published: 2024-11-21T11:15:38.173
Modified: 2024-11-21T19:15:14.947
Link: CVE-2024-9828
Redhat
No data.