Vulnerability Description
The Taskbuilder WordPress plugin before 3.0.5 does not sanitize user input into the 'load_orders' parameter and uses it in a SQL statement, allowing high privilege users such as admin to perform SQL Injection attacks
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Taskbuilder | Taskbuilder | < 3.0.5 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/eb2d0932-fd47-4aef-9d08-4377c742bb6e/ExploitThird Party Advisory
FAQ
What is CVE-2024-9828?
CVE-2024-9828 is a vulnerability with a CVSS score of 4.1 (MEDIUM). The Taskbuilder WordPress plugin before 3.0.5 does not sanitize user input into the 'load_orders' parameter and uses it in a SQL statement, allowing high privilege users such as admin to perform SQL ...
How severe is CVE-2024-9828?
CVE-2024-9828 has been rated MEDIUM with a CVSS base score of 4.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-9828?
Check the references section above for vendor advisories and patch information. Affected products include: Taskbuilder Taskbuilder.