The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'start' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application.
References
Link | Resource |
---|---|
https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/ | Third Party Advisory |
https://wpscan.com/vulnerability/5c98c2d6-d002-4cff-9d6f-633cb3ec6280 | Third Party Advisory |
https://wpdatatables.com/help/whats-new-changelog/ | Release Notes Vendor Advisory |
Configurations
Information
Published : 2021-04-12 07:15
Updated : 2021-04-13 13:14
NVD link : CVE-2021-24199
Mitre link : CVE-2021-24199
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
tms-outsource
- wpdatatables