8.8
CVSSv3

CVE-2021-25076

Published: 24/01/2022 Updated: 18/03/2022
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

The WP User Frontend WordPress plugin prior to 3.5.26 does not validate and escape the status parameter before using it in a SQL statement in the Subscribers dashboard, leading to an SQL injection. Due to the lack of sanitisation and escaping, this could also lead to Reflected Cross-Site Scripting

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wedevs wp user frontend

Exploits

WordPress WP User Frontend plugin version 3525 suffers from an authenticated remote SQL injection vulnerability ...

Github Repositories

Wordpress Plugin WP User Frontend < 3.5.26 - SQL-Injection (Authenticated)

CVE-2021-25076-Exploit Wordpress Plugin WP User Frontend &lt; 3526 - SQL-Injection (Authenticated) CVE description: The WP User Frontend WordPress plugin before 3526 does not validate and escape the status parameter before using it in a SQL statement in the Subscribers dashboard, leading to an SQL injection Due to the lack of sanitisation and escaping, this could also