vulnerability
WordPress Plugin: wpdatatables: CVE-2021-24200: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:L/Au:S/C:P/I:N/A:N) | Mar 16, 2021 | May 15, 2025 | May 15, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
Mar 16, 2021
Added
May 15, 2025
Modified
May 15, 2025
Description
The wpDataTables – Tables and Table Charts premium WordPress plugin before 3.4.2 allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?actionequal toget_wdtableandtable_idequal to1, on the 'length' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application. Please note that this only affects the premium version of the plugin which shares the same slug as the free version.
Solution
wpdatatables-plugin-cve-2021-24200

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.