### [CVE-2021-24463](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24463) ![](https://img.shields.io/static/v1?label=Product&message=Image%20Slider%20by%20Ays-%20Responsive%20Slider%20and%20Carousel&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=2.5.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brightgreen) ### Description The get_sliders() function in the Image Slider by Ays- Responsive Slider and Carousel WordPress plugin before 2.5.0 did not use whitelist or validate the orderby parameter before using it in SQL statements passed to the get_results() DB calls, leading to SQL injection issues in the admin dashboard ### POC #### Reference - https://wpscan.com/vulnerability/994e6198-f0e9-4e30-989f-b5a3dfe95ded #### Github - https://github.com/20142995/nuclei-templates