Files
CVEs-PoC/2021/CVE-2021-24864.md
T
2024-06-18 02:51:15 +02:00

18 lines
754 B
Markdown

### [CVE-2021-24864](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24864)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Cloudy%2C%20weather%20plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=4.4.9%3C%204.4.9%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The WP Cloudy, weather plugin WordPress plugin before 4.4.9 does not escape the post_id parameter before using it in a SQL statement in the admin dashboard, leading to a SQL Injection issue
### POC
#### Reference
- https://wpscan.com/vulnerability/e3b9ee9f-602d-4e9d-810c-e1e3ba604464
#### Github
- https://github.com/ARPSyndicate/cvemon