First published: Mon Jan 24 2022(Updated: )
The WP User Frontend WordPress plugin before 3.5.26 does not validate and escape the status parameter before using it in a SQL statement in the Subscribers dashboard, leading to an SQL injection. Due to the lack of sanitisation and escaping, this could also lead to Reflected Cross-Site Scripting
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wedevs Wp User Frontend | <3.5.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25076 is a vulnerability in the WP User Frontend WordPress plugin before version 3.5.26 that allows SQL injection and potential Reflected Cross-Site Scripting.
CVE-2021-25076 allows an attacker to inject malicious SQL queries and potentially execute arbitrary code or access sensitive information.
WP User Frontend WordPress plugin versions up to exclusive 3.5.26 are affected by CVE-2021-25076.
CVE-2021-25076 has a severity rating of 8.8 (high).
To mitigate the risk of CVE-2021-25076, users should update to WP User Frontend WordPress plugin version 3.5.26 or later.