First published: Fri Feb 04 2022(Updated: )
Unauthenticated SQL Injection (SQLi) vulnerability discovered in [GWA] AutoResponder WordPress plugin (versions <= 2.3), vulnerable at (&listid). No patched version available, plugin closed.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
gwa Autoresponder Project | <=2.3 |
Deactivate and delete. No patched version is available. The plugin was closed on the wordpress.org plugin repository.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44779 is classified as a critical vulnerability due to its potential for unauthenticated SQL injection.
There is no patched version available for CVE-2021-44779, and the plugin has been closed.
CVE-2021-44779 affects all versions of the GWA AutoResponder plugin up to and including version 2.3.
CVE-2021-44779 can potentially allow attackers to execute arbitrary SQL queries, leading to data leakage or manipulation.
No, CVE-2021-44779 can be exploited without authentication, making it particularly dangerous.