Vulnerability Description
The SendGrid WordPress plugin is vulnerable to authorization bypass via the get_ajax_statistics function found in the ~/lib/class-sendgrid-statistics.php file which allows authenticated users to export statistic for a WordPress multi-site main site, in versions up to and including 1.11.8.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sendgrid | Sendgrid | <= 1.11.8 |
Related Weaknesses (CWE)
References
- https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34629Third Party Advisory
- https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34629Third Party Advisory
FAQ
What is CVE-2021-34629?
CVE-2021-34629 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The SendGrid WordPress plugin is vulnerable to authorization bypass via the get_ajax_statistics function found in the ~/lib/class-sendgrid-statistics.php file which allows authenticated users to expor...
How severe is CVE-2021-34629?
CVE-2021-34629 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-34629?
Check the references section above for vendor advisories and patch information. Affected products include: Sendgrid Sendgrid.