Files
CVEs-PoC/2021/CVE-2021-24862.md
2025-09-29 21:09:30 +02:00

26 lines
1.2 KiB
Markdown

### [CVE-2021-24862](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24862)
![](https://img.shields.io/static/v1?label=Product&message=RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%20and%20User%20Login%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=5.0.1.6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brightgreen)
### Description
The RegistrationMagic WordPress plugin before 5.0.1.6 does not escape user input in its rm_chronos_ajax AJAX action before using it in a SQL statement when duplicating tasks in batches, which could lead to a SQL injection issue
### POC
#### Reference
- http://packetstormsecurity.com/files/165746/WordPress-RegistrationMagic-V-5.0.1.5-SQL-Injection.html
- https://wpscan.com/vulnerability/7d3af3b5-5548-419d-aa32-1f7b51622615
#### Github
- https://github.com/20142995/nuclei-templates
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Enes4xd/Enes4xd
- https://github.com/Hacker5preme/Exploits
- https://github.com/cr0ss2018/cr0ss2018
- https://github.com/ezelnur6327/Enes4xd
- https://github.com/ezelnur6327/ezelnur6327