Vulnerability Description
The Coder WordPress plugin through 1.3.4 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Themescoder | Themes Coder | <= 1.3.4 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/ec226d22-0c09-4e7c-86ec-b64819089b60/ExploitThird Party Advisory
FAQ
What is CVE-2024-13726?
CVE-2024-13726 is a vulnerability with a CVSS score of 8.6 (HIGH). The Coder WordPress plugin through 1.3.4 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL ...
How severe is CVE-2024-13726?
CVE-2024-13726 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-13726?
Check the references section above for vendor advisories and patch information. Affected products include: Themescoder Themes Coder.