[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fPwSlU0wtyFrhEWL9Qafr_lyD-KlN5tXnvUPDoaVegYY":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2021-24728","membership-content-restriction-paid-member-subscriptions-sql-injection","Membership & Content Restriction – Paid Member Subscriptions \u003C= 2.4.1 - SQL Injection","The Membership & Content Restriction – Paid Member Subscriptions WordPress plugin before 2.4.2 did not sanitise, validate or escape its order and orderby parameters before using them in SQL statement, leading to authenticated SQL injections in the Members and Payments pages.","paid-member-subscriptions",null,"\u003C=2.4.1","2.4.2","high",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","2021-08-06 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F52203b9c-7629-4969-8d2d-eb1ef33d160c?source=api-prod",900]