Vulnerability Description
The WP Email Users WordPress plugin through 1.7.6 does not escape the data_raw parameter in the weu_selected_users_1 AJAX action, available to any authenticated users, allowing them to perform SQL injection attacks.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Techspawn | Wp-Email-Users | <= 1.7.6 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/0471d2e2-e759-468f-becd-0b062f00b435ExploitThird Party Advisory
- https://wpscan.com/vulnerability/0471d2e2-e759-468f-becd-0b062f00b435ExploitThird Party Advisory
FAQ
What is CVE-2021-24959?
CVE-2021-24959 is a vulnerability with a CVSS score of 8.8 (HIGH). The WP Email Users WordPress plugin through 1.7.6 does not escape the data_raw parameter in the weu_selected_users_1 AJAX action, available to any authenticated users, allowing them to perform SQL inj...
How severe is CVE-2021-24959?
CVE-2021-24959 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-24959?
Check the references section above for vendor advisories and patch information. Affected products include: Techspawn Wp-Email-Users.