Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-24555

Опубликовано: 23 авг. 2021
Источник: nvd
CVSS3: 8.8
CVSS2: 6.5
EPSS Низкий

Описание

The daac_delete_booking_callback function, hooked to the daac_delete_booking AJAX action, takes the id POST parameter which is passed into the SQL statement without proper sanitisation, validation or escaping, leading to a SQL Injection issue. Furthermore, the ajax action is lacking any CSRF and capability check, making it available to any authenticated user.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:roosty:diary-availability-calendar:*:*:*:*:*:wordpress:*:*
Версия до 1.0.3 (включая)

EPSS

Процентиль: 58%
0.0037
Низкий

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-89
CWE-89

Связанные уязвимости

CVSS3: 8.8
github
больше 3 лет назад

The daac_delete_booking_callback function, hooked to the daac_delete_booking AJAX action, takes the id POST parameter which is passed into the SQL statement without proper sanitisation, validation or escaping, leading to a SQL Injection issue. Furthermore, the ajax action is lacking any CSRF and capability check, making it available to any authenticated user.

EPSS

Процентиль: 58%
0.0037
Низкий

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-89
CWE-89