{"api_version":"1","generated_at":"2026-04-17T09:16:52+00:00","cve":"CVE-2021-24340","urls":{"html":"https://cve.report/CVE-2021-24340","api":"https://cve.report/api/cve/CVE-2021-24340.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-24340","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-24340"},"summary":{"title":"CVE-2021-24340","description":"The WP Statistics WordPress plugin before 13.0.8 relied on using the WordPress esc_sql() function on a field not delimited by quotes and did not first prepare the query. Additionally, the page, which should have been accessible to administrator only, was also available to any visitor, including unauthenticated ones.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2021-06-07 11:15:00","updated_at":"2021-06-14 17:47:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"https://www.wordfence.com/blog/2021/05/over-600000-sites-impacted-by-wp-statistics-patch/","name":"https://www.wordfence.com/blog/2021/05/over-600000-sites-impacted-by-wp-statistics-patch/","refsource":"MISC","tags":[],"title":"Over 600,000 Sites Impacted by WP Statistics Patch","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://wpscan.com/vulnerability/d2970cfb-0aa9-4516-9a4b-32971f41a19c","name":"https://wpscan.com/vulnerability/d2970cfb-0aa9-4516-9a4b-32971f41a19c","refsource":"CONFIRM","tags":[],"title":"Attention Required! | Cloudflare","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-24340","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24340","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Ram Gall (Wordfence)","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"24340","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veronalabs","cpe5":"wp_statistics","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-24340","qid":"730091","title":"WordPress WP Statistics Plugin SQL Injection Vulnerability"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2021-24340","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"WP Statistics < 13.0.8 - Unauthenticated SQL Injection"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"VeronaLabs","product":{"product_data":[{"product_name":"WP Statistics","version":{"version_data":[{"version_affected":"<","version_name":"13.0.8","version_value":"13.0.8"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The WP Statistics WordPress plugin before 13.0.8 relied on using the WordPress esc_sql() function on a field not delimited by quotes and did not first prepare the query. Additionally, the page, which should have been accessible to administrator only, was also available to any visitor, including unauthenticated ones."}]},"references":{"reference_data":[{"refsource":"CONFIRM","url":"https://wpscan.com/vulnerability/d2970cfb-0aa9-4516-9a4b-32971f41a19c","name":"https://wpscan.com/vulnerability/d2970cfb-0aa9-4516-9a4b-32971f41a19c"},{"refsource":"MISC","url":"https://www.wordfence.com/blog/2021/05/over-600000-sites-impacted-by-wp-statistics-patch/","name":"https://www.wordfence.com/blog/2021/05/over-600000-sites-impacted-by-wp-statistics-patch/"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-89 SQL Injection","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Ram Gall (Wordfence)"}],"source":{"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-06-07 11:15:00","lastModifiedDate":"2021-06-14 17:47:00","problem_types":["CWE-89"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"13.0.8","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"24340","Ordinal":"199102","Title":"CVE-2021-24340","CVE":"CVE-2021-24340","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"24340","Ordinal":"1","NoteData":"The WP Statistics WordPress plugin before 13.0.8 relied on using the WordPress esc_sql() function on a field not delimited by quotes and did not first prepare the query. Additionally, the page, which should have been accessible to administrator only, was also available to any visitor, including unauthenticated ones.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"24340","Ordinal":"2","NoteData":"2021-06-07","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"24340","Ordinal":"3","NoteData":"2021-06-07","Type":"Other","Title":"Modified"}]}}}