Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2021-24931

CWE-89SQL Injection6 documents6 sources
Severity
9.8CRITICAL
EPSS
72.2%
top 1.25%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedDec 6
Latest updateFeb 11

Description

The Secure Copy Content Protection and Content Locking WordPress plugin before 2.8.2 does not escape the sccp_id parameter of the ays_sccp_results_export_file AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an SQL injection.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

🔴Vulnerability Details

3
GHSA
GHSA-pqpx-fr5w-2v75: The Secure Copy Content Protection and Content Locking WordPress plugin before 22022-02-11
CVEList
Secure Copy Content Protection and Content Locking < 2.8.2 - Unauthenticated SQL Injection2021-12-06
VulnCheck
ays-pro secure_copy_content_protection_and_content_locking Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')2021

💥Exploits & PoCs

2
Exploit-DB
WordPress Plugin Secure Copy Content Protection and Content Locking 2.8.1 - SQL-Injection (Unauthenticated)2022-02-10
Nuclei
WordPress Secure Copy Content Protection and Content Locking <2.8.2 - SQL Injection
CVE-2021-24931 (CRITICAL CVSS 9.8) | The Secure Copy Content Protection | cvebase.io