CVE-2021-43408
Duplicate Post WordPress Plugin SQL Injection Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
The "Duplicate Post" WordPress plugin up to and including version 1.1.9 is vulnerable to SQL Injection. SQL injection vulnerabilities occur when client supplied data is included within an SQL Query insecurely. SQL Injection can typically be exploited to read, modify and delete SQL table data. In many cases it also possible to exploit features of SQL server to execute system commands and/or access the local file system. This particular vulnerability can be exploited by any authenticated user who has been granted access to use the Duplicate Post plugin. By default, this is limited to Administrators, however the plugin presents the option to permit access to the Editor, Author, Contributor and Subscriber roles.
El plugin de WordPress "Duplicate Post" hasta la versión 1.1.9 inclusive es vulnerable a la inyección SQL. Las vulnerabilidades de inyección SQL se producen cuando los datos suministrados por el cliente se incluyen en una consulta SQL de forma insegura. La inyección SQL puede ser explotada típicamente para leer, modificar y borrar datos de tablas SQL. En muchos casos también es posible explotar las características del servidor SQL para ejecutar comandos del sistema y/o acceder al sistema de archivos local. Esta vulnerabilidad en particular puede ser explotada por cualquier usuario autenticado al que se le haya concedido acceso para utilizar el plugin Duplicate Post. Por defecto, esto está limitado a los Administradores, sin embargo el plugin presenta la opción de permitir el acceso a los roles de Editor, Autor, Colaborador y Suscriptor
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-10-19 CVE Published
- 2021-11-05 CVE Reserved
- 2022-05-31 First Exploit
- 2024-09-17 CVE Updated
- 2024-11-07 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://plugins.trac.wordpress.org/browser/copy-delete-posts/tags/1.2.0/post/handler.php#L510 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/tuannq2299/CVE-2021-43408 | 2022-05-31 | |
https://appcheck-ng.com/security-advisory-duplicate-post-wordpress-plugin-sql-injection-vulnerability | 2024-09-17 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Duplicate Post Project Search vendor "Duplicate Post Project" | Duplicate Post Search vendor "Duplicate Post Project" for product "Duplicate Post" | <= 1.1.9 Search vendor "Duplicate Post Project" for product "Duplicate Post" and version " <= 1.1.9" | wordpress |
Affected
|