First published: Tue Nov 23 2021(Updated: )
The MainWP Child WordPress plugin before 4.1.8 does not validate the orderby and order parameter before using them in a SQL statement, leading to an SQL injection exploitable by high privilege users such as admin when the Backup and Staging by WP Time Capsule plugin is installed
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
MainWP Child Reports | <4.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the MainWP Child WordPress plugin is CVE-2021-24877.
The severity of CVE-2021-24877 is high.
CVE-2021-24877 allows high privilege users to exploit an SQL injection vulnerability when the Backup and Staging by WP Time Capsule plugin is installed.
The affected software for CVE-2021-24877 is the MainWP Child WordPress plugin before version 4.1.8.
Yes, you can find more information about CVE-2021-24877 at this reference link: https://wpscan.com/vulnerability/b09fe120-ab9b-44f2-b50d-3b4b299d6d15