Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2021-24666

CWE-89SQL Injection5 documents5 sources
Severity
9.8CRITICAL
EPSS
81.0%
top 0.85%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 27
Latest updateMay 24

Description

The Podlove Podcast Publisher WordPress plugin before 3.5.6 contains a 'Social & Donations' module (not activated by default), which adds the rest route '/services/contributor/(?P[\d]+), takes an 'id' and 'category' parameters as arguments. Both parameters can be used for the SQLi.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-2c3j-j92w-h38q: The Podlove Podcast Publisher WordPress plugin before 32022-05-24
CVEList
Podlove Podcast Publisher < 3.5.6 - Unauthenticated SQL Injection2021-09-27
VulnCheck
podlove podlove_podcast_publisher Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')2021

💥Exploits & PoCs

1
Nuclei
WordPress Podlove Podcast Publisher <3.5.6 - SQL Injection