First published: Sun Jan 23 2022(Updated: )
Projectworlds online-shopping-webvsite-in-php 1.0 suffers from a SQL Injection vulnerability via the "id" parameter in cart_add.php, No login is required.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds online-shopping-webvsite-in-php | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-46024 is critical.
CVE-2021-46024 impacts Projectworlds online-shopping-webvsite-in-php 1.0 by allowing SQL injection via the "id" parameter in cart_add.php without requiring login.
To fix the SQL Injection vulnerability in Projectworlds online-shopping-webvsite-in-php 1.0, you should sanitize and validate user input, and use prepared statements or parameterized queries.
The Common Weakness Enumeration (CWE) for CVE-2021-46024 is CWE-89 (Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection')).
You can find more information about CVE-2021-46024 at this reference: https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/3