The G Auto-Hyperlink WordPress plugin through 1.0.1 does not sanitise or escape an ‘id’ GET parameter before using it in a SQL statement, to select data to be displayed in the admin dashboard, leading to an authenticated SQL injection
View the template here CVE-2021-24627.yaml
References:
https://wordpress.org/plugins/g-auto-hyperlink/