First published: Mon Jul 12 2021(Updated: )
The Poll, Survey, Questionnaire and Voting system WordPress plugin before 1.5.3 did not sanitise, escape or validate the date_answers[] POST parameter before using it in a SQL statement when sending a Poll result, allowing unauthenticated users to perform SQL Injection attacks
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpdevart Poll\, Survey\, Questionnaire And Voting System | <1.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-24442.
The severity of CVE-2021-24442 is critical with a CVSS score of 9.8.
The affected software of CVE-2021-24442 is the Poll, Survey, Questionnaire and Voting system WordPress plugin version up to 1.5.3.
CVE-2021-24442 allows unauthenticated users to perform SQL injection attacks on the affected software.
Yes, you can find references for CVE-2021-24442 at the following links: [1] https://wpscan.com/vulnerability/7376666e-9b2a-4239-b11f-8544435b444a, [2] https://www.in-spired.xyz/wpdevart-polls-blind-sql-injection/