First published: Mon Jan 10 2022(Updated: )
The RegistrationMagic WordPress plugin before 5.0.1.6 does not escape user input in its rm_chronos_ajax AJAX action before using it in a SQL statement when duplicating tasks in batches, which could lead to a SQL injection issue
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Metagauss Registrationmagic | <5.0.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-24862 is a vulnerability in the RegistrationMagic WordPress plugin before version 5.0.1.6 that allows for SQL injection due to user input not being properly escaped in an AJAX action.
The severity of CVE-2021-24862 is rated as high with a CVSS score of 7.2.
CVE-2021-24862 affects the RegistrationMagic WordPress plugin before version 5.0.1.6, specifically in the rm_chronos_ajax action where user input is not properly escaped before being used in a SQL statement.
The affected software for CVE-2021-24862 is the RegistrationMagic WordPress plugin before version 5.0.1.6.
Yes, the fix for CVE-2021-24862 is to update the RegistrationMagic WordPress plugin to version 5.0.1.6 or later.