CVE-2021-25030SQL Injection in Events Made Easy

CWE-89SQL Injection3 documents3 sources
Severity
8.8HIGHNVD
EPSS
0.7%
top 27.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 3
Latest updateJan 4

Description

The Events Made Easy WordPress plugin before 2.2.36 does not sanitise and escape the search_text parameter before using it in a SQL statement via the eme_searchmail AJAX action, available to any authenticated users. As a result, users with a role as low as subscriber can call it and perform SQL injection attacks

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-7542-2wqc-jc3v: The Events Made Easy WordPress plugin before 22022-01-04
CVEList
Events Made Easy < 2.2.36 - Subscriber+ SQL Injection2022-01-03
CVE-2021-25030 — SQL Injection in Events Made Easy | cvebase