First published: Mon Jul 12 2021(Updated: )
The Filebird Plugin 4.7.3 introduced a SQL injection vulnerability as it is making SQL queries without escaping user input data from a HTTP post request. This is a major vulnerability as the user input is not escaped and passed directly to the get_col function and it allows SQL injection. The Rest API endpoint which invokes this function also does not have any required permissions/authentication and can be accessed by an anonymous user.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ninja Team Filebird | =4.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-24385 is a SQL injection vulnerability in the Filebird Plugin version 4.7.3 for WordPress.
CVE-2021-24385 allows attackers to inject malicious SQL queries into your website, potentially leading to unauthorized access or data manipulation.
The severity of CVE-2021-24385 is critical, with a severity rating of 9.8 out of 10.
The Filebird Plugin version 4.7.3 for WordPress is affected by CVE-2021-24385.
To fix the CVE-2021-24385 vulnerability, you should update the Filebird Plugin to a version that has addressed the SQL injection issue.