### [CVE-2021-24314](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24314) ![](https://img.shields.io/static/v1?label=Product&message=Goto&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=2.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brightgreen) ### Description The Goto WordPress theme before 2.1 did not sanitise, validate of escape the keywords GET parameter from its listing page before using it in a SQL statement, leading to an Unauthenticated SQL injection issue ### POC #### Reference - https://m0ze.ru/vulnerability/%5B2021-03-24%5D-%5BWordPress%5D-%5BCWE-89%5D-Goto-WordPress-Theme-v2.0.txt - https://wpscan.com/vulnerability/1cc6dc17-b019-49dd-8149-c8bba165eb30 #### Github - https://github.com/20142995/nuclei-templates