Files
CVEs-PoC/2021/CVE-2021-24748.md
T
2024-06-18 02:51:15 +02:00

18 lines
758 B
Markdown

### [CVE-2021-24748](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24748)
![](https://img.shields.io/static/v1?label=Product&message=Email%20Before%20Download&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=6.8%3C%206.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The Email Before Download WordPress plugin before 6.8 does not properly validate and escape the order and orderby GET parameters before using them in SQL statements, leading to authenticated SQL injection issues
### POC
#### Reference
- https://wpscan.com/vulnerability/a8625b84-337d-4c4d-a698-73e59d1f8ee1
#### Github
No PoCs found on GitHub currently.