Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2021-24666
Severity
9.8CRITICAL
EPSS
81.0%
top 0.85%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedSep 27
Latest updateMay 24
Description
The Podlove Podcast Publisher WordPress plugin before 3.5.6 contains a 'Social & Donations' module (not activated by default), which adds the rest route '/services/contributor/(?P[\d]+), takes an 'id' and 'category' parameters as arguments. Both parameters can be used for the SQLi.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages2 packages
Patches
🔴Vulnerability Details
3VulnCheck▶
podlove podlove_podcast_publisher Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')↗2021
💥Exploits & PoCs
1Nuclei▶
WordPress Podlove Podcast Publisher <3.5.6 - SQL Injection