### [CVE-2021-24949](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24949) ![](https://img.shields.io/static/v1?label=Product&message=The%20Plus%20Addons%20for%20Elementor%20-%20Pro&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=5.0.4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.0.7%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brightgreen) ### Description The "WP Search Filters" widget of The Plus Addons for Elementor - Pro WordPress plugin before 5.0.7 does not sanitise and escape the option parameter before using it in a SQL statement, which could lead to SQL injection ### POC #### Reference - https://wpscan.com/vulnerability/9d7f8ba8-a5d5-4ec3-a48f-5cd4b115e8d5 #### Github - https://github.com/20142995/nuclei-templates