// For flags

CVE-2021-24858

WP Cookie User Info < 1.0.9 - Admin+ SQL Injection

Severity Score

7.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Cookie Notification Plugin for WordPress plugin before 1.0.9 does not sanitise or escape the id GET parameter before using it in a SQL statement, when retrieving the setting to edit in the admin dashboard, leading to an authenticated SQL Injection

El plugin Cookie Notification Plugin para WordPress versiones anteriores a 1.0.9, no sanea o escapa del parámetro id GET antes de usarlo en una sentencia SQL, cuando recupera la configuración para editar en el panel de administración, conllevando a una inyección SQL autenticada

*Credits: Shreya Pohekar of Codevigilant Project
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-01-14 CVE Reserved
  • 2021-12-27 CVE Published
  • 2023-08-17 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Accesspressthemes
Search vendor "Accesspressthemes"
Wp Cookie User Info
Search vendor "Accesspressthemes" for product "Wp Cookie User Info"
< 1.0.9
Search vendor "Accesspressthemes" for product "Wp Cookie User Info" and version " < 1.0.9"
wordpress
Affected