First published: Mon Jan 03 2022(Updated: )
The Download Monitor WordPress plugin before 4.4.5 does not properly validate and escape the "orderby" GET parameter before using it in a SQL statement when viewing the logs, leading to an SQL Injection issue
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPChill Download Monitor | <4.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-24786.
The severity level of CVE-2021-24786 is high with a score of 7.2.
The Download Monitor WordPress plugin version up to and excluding 4.4.5 is affected by CVE-2021-24786.
CVE-2021-24786 allows for SQL Injection, which can lead to unauthorized access or data manipulation.
To fix CVE-2021-24786, update the Download Monitor WordPress plugin to version 4.4.5 or later.