First published: Mon Sep 27 2021(Updated: )
The Podlove Podcast Publisher WordPress plugin before 3.5.6 contains a 'Social & Donations' module (not activated by default), which adds the rest route '/services/contributor/(?P<id>[\d]+), takes an 'id' and 'category' parameters as arguments. Both parameters can be used for the SQLi.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Podlove Podcast Publisher | <3.5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-24666 has a medium severity rating due to improper input validation in the Podlove Podcast Publisher plugin.
To fix CVE-2021-24666, update the Podlove Podcast Publisher plugin to version 3.5.6 or higher.
The affected versions for CVE-2021-24666 are all versions of the Podlove Podcast Publisher plugin before 3.5.6.
CVE-2021-24666 is associated with SQL injection vulnerabilities due to the misuse of parameters in the REST API.
No, the 'Social & Donations' module in the Podlove Podcast Publisher is not activated by default.