CVE-2021-4134
Fancy Product Designer <= 4.7.4 Admin+ SQL Injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The Fancy Product Designer WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the ID parameter found in the ~/inc/api/class-view.php file which allows attackers with administrative level permissions to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 4.7.4.
El plugin Fancy Product Designer de WordPress es vulnerable a la inyección SQL debido a un escape y parametrización insuficientes del parámetro ID que se encuentra en el archivo ~/inc/api/class-view.php, lo que permite a atacantes con permisos de nivel administrativo inyectar consultas SQL arbitrarias para obtener información confidencial, en versiones hasta 4.7.4 incluyéndola
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-12-17 CVE Reserved
- 2022-02-08 CVE Published
- 2023-07-30 EPSS Updated
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-4134 | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://support.fancyproductdesigner.com/support/discussions/topics/13000031264 | 2022-02-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Radykal Search vendor "Radykal" | Fancy Product Designer Search vendor "Radykal" for product "Fancy Product Designer" | < 4.7.5 Search vendor "Radykal" for product "Fancy Product Designer" and version " < 4.7.5" | wordpress |
Affected
|