.. / CVE-2021-24627

Exploit for G Auto-Hyperlink <= 1.0.1 - SQL Injection (CVE-2021-24627)

Description:

The G Auto-Hyperlink WordPress plugin through 1.0.1 does not sanitise or escape an ‘id’ GET parameter before using it in a SQL statement, to select data to be displayed in the admin dashboard, leading to an authenticated SQL injection

Nuclei Template

View the template here CVE-2021-24627.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-24627.yaml
Copy

References:

https://wordpress.org/plugins/g-auto-hyperlink/
https://github.com/ARPSyndicate/cvemon
https://wpscan.com/vulnerability/c04ea768-150f-41b8-b08c-78d1ae006bbb
https://nvd.nist.gov/vuln/detail/CVE-2021-24627