WPScan
How it worksPricing
Vulnerabilities
WordPressPluginsThemesStatsSubmit vulnerabilities
For developers
StatusAPI detailsCLI scanner
Contact
WPScan
How it worksPricing
Vulnerabilities
WordPressPluginsThemesStatsSubmit vulnerabilities
For developers
StatusAPI detailsCLI scanner
Contact

WordPress Plugin Vulnerabilities

wpDataTables < 3.4.2 - Blind SQL Injection via start Parameter

Description

The plugin allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'start' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application.

Note: This affect the premium version of the plugin, however, both the premium and free plugins have the same slug.

Affects Plugins

wpdatatables
Fixed in version 3.4.2

References

CVE
CVE-2021-24199
URL
https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/
URL
https://wpdatatables.com/help/whats-new-changelog/

Classification

Type

SQLI

OWASP top 10
A1: Injection
CWE
CWE-89

Miscellaneous

Original Researcher

Veno Eivazian, Massimiliano Ferraresi

Submitter

Veno Eivazian

Submitter website
https://n4nj0.github.io/
Verified

Yes

WPVDB ID
5c98c2d6-d002-4cff-9d6f-633cb3ec6280

Timeline

Publicly Published

2021-03-16 (about 1 years ago)

Added

2021-03-25 (about 1 years ago)

Last Updated

2021-03-28 (about 1 years ago)

Our Other Services

WPScan WordPress Security Plugin
WPScan

Vulnerabilities

WordPressPluginsThemesOur StatsSubmit vulnerabilities

About

How it worksPricingWordPress pluginNewsContact

For Developers

StatusAPI detailsCLI scanner

Other

PrivacyTerms of serviceDisclosure policy
jetpackIn partnership with Jetpack
githubtwitterfacebook
Angithubendeavor
Work With Us