First published: Wed Jul 21 2021(Updated: )
The SendGrid WordPress plugin is vulnerable to authorization bypass via the get_ajax_statistics function found in the ~/lib/class-sendgrid-statistics.php file which allows authenticated users to export statistic for a WordPress multi-site main site, in versions up to and including 1.11.8.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
SendGrid | <=1.11.8 |
Uninstall the plugin from WordPress site.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34629 is classified as a high severity vulnerability due to the ease of exploitation and potential data exposure.
To mitigate CVE-2021-34629, update the SendGrid WordPress plugin to version 1.11.9 or later.
CVE-2021-34629 affects the SendGrid plugin for WordPress versions up to and including 1.11.8.
CVE-2021-34629 can be exploited by authenticated users with access to the WordPress multi-site administration.
CVE-2021-34629 allows attackers to bypass authorization and export statistics from a WordPress multi-site main site.