Vulnerability Description
The options.php file of the WP-Board WordPress plugin through 1.1 beta accepts a postid parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query ran twice.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wp-Board Project | Wp-Board | <= 1.1 |
Related Weaknesses (CWE)
References
- https://codevigilant.com/disclosure/2021/wp-plugin-wp-board/ExploitThird Party Advisory
- https://wpscan.com/vulnerability/a86240e1-f064-4972-9f97-6b349fdd57f6ExploitThird Party Advisory
- https://codevigilant.com/disclosure/2021/wp-plugin-wp-board/ExploitThird Party Advisory
- https://wpscan.com/vulnerability/a86240e1-f064-4972-9f97-6b349fdd57f6ExploitThird Party Advisory
FAQ
What is CVE-2021-24404?
CVE-2021-24404 is a vulnerability with a CVSS score of 8.8 (HIGH). The options.php file of the WP-Board WordPress plugin through 1.1 beta accepts a postid parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injec...
How severe is CVE-2021-24404?
CVE-2021-24404 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-24404?
Check the references section above for vendor advisories and patch information. Affected products include: Wp-Board Project Wp-Board.