First published: Wed Jun 07 2023(Updated: )
The uListing plugin for WordPress is vulnerable to generic SQL Injection via the ‘listing_id’ parameter in versions up to, and including, 1.6.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
StylemixThemes uListing | <=1.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4340 is a vulnerability in the uListing plugin for WordPress that allows for generic SQL Injection via the 'listing_id' parameter.
CVE-2021-4340 has a severity rating of 7.5 (critical).
The uListing plugin for WordPress versions up to and including 1.6.6 is affected by CVE-2021-4340.
The SQL Injection in CVE-2021-4340 can be exploited by manipulating the 'listing_id' parameter and injecting malicious SQL code to perform unauthorized actions.
Yes, patches and fixes are available for CVE-2021-4340. It is recommended to update to a version of the uListing plugin for WordPress that is not vulnerable.