// For flags

CVE-2021-43408

Duplicate Post WordPress Plugin SQL Injection Vulnerability

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The "Duplicate Post" WordPress plugin up to and including version 1.1.9 is vulnerable to SQL Injection. SQL injection vulnerabilities occur when client supplied data is included within an SQL Query insecurely. SQL Injection can typically be exploited to read, modify and delete SQL table data. In many cases it also possible to exploit features of SQL server to execute system commands and/or access the local file system. This particular vulnerability can be exploited by any authenticated user who has been granted access to use the Duplicate Post plugin. By default, this is limited to Administrators, however the plugin presents the option to permit access to the Editor, Author, Contributor and Subscriber roles.

El plugin de WordPress "Duplicate Post" hasta la versión 1.1.9 inclusive es vulnerable a la inyección SQL. Las vulnerabilidades de inyección SQL se producen cuando los datos suministrados por el cliente se incluyen en una consulta SQL de forma insegura. La inyección SQL puede ser explotada típicamente para leer, modificar y borrar datos de tablas SQL. En muchos casos también es posible explotar las características del servidor SQL para ejecutar comandos del sistema y/o acceder al sistema de archivos local. Esta vulnerabilidad en particular puede ser explotada por cualquier usuario autenticado al que se le haya concedido acceso para utilizar el plugin Duplicate Post. Por defecto, esto está limitado a los Administradores, sin embargo el plugin presenta la opción de permitir el acceso a los roles de Editor, Autor, Colaborador y Suscriptor

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-10-19 CVE Published
  • 2021-11-05 CVE Reserved
  • 2022-05-31 First Exploit
  • 2024-09-17 CVE Updated
  • 2024-11-07 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Duplicate Post Project
Search vendor "Duplicate Post Project"
Duplicate Post
Search vendor "Duplicate Post Project" for product "Duplicate Post"
<= 1.1.9
Search vendor "Duplicate Post Project" for product "Duplicate Post" and version " <= 1.1.9"
wordpress
Affected