[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fZNkY60jfdO-QvZJ6-DWAqiflI6ww6FbtbJWSV4G0EYs":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2021-24200","wpdatatables-premium-blind-sql-injection-via-length-parameter","wpDataTables (Premium) \u003C= 3.4.1 - Blind SQL Injection via length Parameter","The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint \u002Fwp-admin\u002Fadmin-ajax.php?action=get_wdtable&table_id=1, on the 'length' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application. Please note that this only affects the premium version of the plugin which shares the same slug as the free version.","wpdatatables",null,"\u003C3.4.2","3.4.2","medium",6.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","2021-03-16 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F16b407ab-9687-4a10-b458-ad39661e4fb0?source=api-prod",1043]