First published: Tue Mar 25 2025(Updated: )
The WP-Recall WordPress plugin before 16.26.12 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP-Recall | <16.26.12 | |
Plechev Andrey WP-Recall | <16.26.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9770 is classified as a critical severity vulnerability due to its potential for SQL injection attacks.
To fix CVE-2024-9770, upgrade the WP-Recall plugin to version 16.26.12 or later.
Anyone using the WP-Recall WordPress plugin prior to version 16.26.12 is affected by CVE-2024-9770.
CVE-2024-9770 enables SQL injection attacks, allowing unauthorized database access through improperly sanitized inputs.
CVE-2024-9770 is present in the WP-Recall WordPress plugin, specifically due to inadequate parameter sanitization in SQL statements.