{"containers":{"cna":{"affected":[{"product":"Email Log","vendor":"Unknown","versions":[{"lessThan":"2.4.7","status":"affected","version":"2.4.7","versionType":"custom"}]}],"credits":[{"lang":"en","value":"bl4derunner"}],"descriptions":[{"lang":"en","value":"The Email Log WordPress plugin before 2.4.7 does not properly validate, sanitise and escape the \"orderby\" and \"order\" GET parameters before using them in SQL statement in the admin dashboard, leading to SQL injections"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89 SQL Injection","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-11-17T10:15:33.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/8dd70db4-5845-440d-8b1d-012738abaac2"}],"source":{"discovery":"EXTERNAL"},"title":"Email Log < 2.4.7 - Admin+ SQL Injection","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24758","STATE":"PUBLIC","TITLE":"Email Log < 2.4.7 - Admin+ SQL Injection"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Email Log","version":{"version_data":[{"version_affected":"<","version_name":"2.4.7","version_value":"2.4.7"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"bl4derunner"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Email Log WordPress plugin before 2.4.7 does not properly validate, sanitise and escape the \"orderby\" and \"order\" GET parameters before using them in SQL statement in the admin dashboard, leading to SQL injections"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-89 SQL Injection"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/8dd70db4-5845-440d-8b1d-012738abaac2","refsource":"MISC","url":"https://wpscan.com/vulnerability/8dd70db4-5845-440d-8b1d-012738abaac2"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:42:16.879Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/8dd70db4-5845-440d-8b1d-012738abaac2"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24758","datePublished":"2021-11-17T10:15:34.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:42:16.879Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}