{"api_version":"1","generated_at":"2026-04-21T18:05:09+00:00","cve":"CVE-2021-24198","urls":{"html":"https://cve.report/CVE-2021-24198","api":"https://cve.report/api/cve/CVE-2021-24198.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-24198","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-24198"},"summary":{"title":"CVE-2021-24198","description":"The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 has Improper Access Control. A low privilege authenticated user that visits the page where the table is published can tamper the parameters to delete the data of another user that are present in the same table through id_key and id_val parameters. By exploiting this issue an attacker is able to delete the data of all users in the same table.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2021-04-12 14:15:00","updated_at":"2022-07-30 12:55:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/","name":"https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/","refsource":"MISC","tags":[],"title":"WordPress Plugin wpDataTables - Multiple Vulnerabilities - The Tales of N4nj0","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://wpscan.com/vulnerability/d953bc62-8a6f-445b-a556-bc25cdd200e3","name":"https://wpscan.com/vulnerability/d953bc62-8a6f-445b-a556-bc25cdd200e3","refsource":"CONFIRM","tags":[],"title":"Attention Required! | Cloudflare","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://wpdatatables.com/help/whats-new-changelog/","name":"https://wpdatatables.com/help/whats-new-changelog/","refsource":"MISC","tags":[],"title":"What's new / Changelog - wpDataTables - Tables and Charts WordPress Plugin","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-24198","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24198","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Veno Eivazian, Massimiliano Ferraresi","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"24198","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tms-outsource","cpe5":"wpdatatables","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"premium","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2021-24198","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"wpDataTables < 3.4.2 - Improper Access Control leading to Table Data Deletion"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"wpDataTables","product":{"product_data":[{"product_name":"wpDataTables – Tables & Table Charts","version":{"version_data":[{"version_affected":"<","version_name":"3.4.2","version_value":"3.4.2"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 has Improper Access Control. A low privilege authenticated user that visits the page where the table is published can tamper the parameters to delete the data of another user that are present in the same table through id_key and id_val parameters. By exploiting this issue an attacker is able to delete the data of all users in the same table."}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpdatatables.com/help/whats-new-changelog/","name":"https://wpdatatables.com/help/whats-new-changelog/"},{"refsource":"MISC","url":"https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/","name":"https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/"},{"refsource":"CONFIRM","url":"https://wpscan.com/vulnerability/d953bc62-8a6f-445b-a556-bc25cdd200e3","name":"https://wpscan.com/vulnerability/d953bc62-8a6f-445b-a556-bc25cdd200e3"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-284 Improper Access Control","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Veno Eivazian, Massimiliano Ferraresi"}],"source":{"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-04-12 14:15:00","lastModifiedDate":"2022-07-30 12:55:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":5.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tms-outsource:wpdatatables:*:*:*:*:premium:wordpress:*:*","versionEndExcluding":"3.4.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"24198","Ordinal":"198960","Title":"CVE-2021-24198","CVE":"CVE-2021-24198","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"24198","Ordinal":"1","NoteData":"The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 has Improper Access Control. A low privilege authenticated user that visits the page where the table is published can tamper the parameters to delete the data of another user that are present in the same table through id_key and id_val parameters. By exploiting this issue an attacker is able to delete the data of all users in the same table.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"24198","Ordinal":"2","NoteData":"2021-04-12","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"24198","Ordinal":"3","NoteData":"2021-04-12","Type":"Other","Title":"Modified"}]}}}