The hndtst_action_instance_callback AJAX call of the Handsome Testimonials & Reviews WordPress plugin before 2.1.1, available to any authenticated users, does not sanitise, validate or escape the hndtst_previewShortcodeInstanceId POST parameter before using it in a SQL statement, leading to an SQL Injection issue.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/42760007-0e59-4d45-8d64-86bc0b8dacea | Exploit Third Party Advisory |
https://codevigilant.com/disclosure/2021/wp-plugin-handsome-testimonials/ | Exploit Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-08-02 04:15
Updated : 2021-08-10 09:52
NVD link : CVE-2021-24492
Mitre link : CVE-2021-24492
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
handsome_testimonials_\&_reviews_project
- handsome_testimonials_\&_reviews