.. / CVE-2021-24750

Exploit for WordPress Visitor Statistics (Real Time Traffic) <4.8 -SQL Injection (CVE-2021-24750)

Description:

WordPress Visitor Statistics (Real Time Traffic) plugin before 4.8 does not properly sanitize and escape the refUrl in the refDetails AJAX action, which is available to any authenticated user. This could allow users with a role as low as subscriber to perform SQL injection attacks.

Nuclei Template

View the template here CVE-2021-24750.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-24750.yaml
Copy

References:

https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de
https://nvd.nist.gov/vuln/detail/CVE-2021-24750
https://plugins.trac.wordpress.org/changeset/2622268
https://github.com/fimtow/CVE-2021-24750/blob/master/exploit.py
https://github.com/WhooAmii/POC_to_review