CVE-2021-24404
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
20/09/2021
Last modified:
28/09/2021
Description
The options.php file of the WP-Board WordPress plugin through 1.1 beta accepts a postid parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query ran twice.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:wp-board_project:wp-board:*:*:*:*:*:wordpress:*:* | 1.1 (including) |
To consult the complete list of CPE names with products and versions, see this page



