CVE-2024-9831

The Taskbuilder WordPress plugin before 3.0.9 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
Configurations

Configuration 1 (hide)

cpe:2.3:a:taskbuilder:taskbuilder:*:*:*:*:*:wordpress:*:*

History

12 Jun 2025, 16:33

Type Values Removed Values Added
CWE CWE-89
CPE cpe:2.3:a:taskbuilder:taskbuilder:*:*:*:*:*:wordpress:*:*
References () https://wpscan.com/vulnerability/390baaf8-a162-43e5-9367-0d2e979d89f7/ - () https://wpscan.com/vulnerability/390baaf8-a162-43e5-9367-0d2e979d89f7/ - Exploit, Third Party Advisory
First Time Taskbuilder
Taskbuilder taskbuilder

16 May 2025, 14:15

Type Values Removed Values Added
Summary
  • (es) El complemento Taskbuilder de WordPress anterior a la versión 3.0.9 no depura ni escapa un parámetro antes de usarlo en una declaración SQL, lo que permite a los administradores realizar ataques de inyección SQL.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
References () https://wpscan.com/vulnerability/390baaf8-a162-43e5-9367-0d2e979d89f7/ - () https://wpscan.com/vulnerability/390baaf8-a162-43e5-9367-0d2e979d89f7/ -

15 May 2025, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-15 20:16

Updated : 2025-06-12 16:33


NVD link : CVE-2024-9831

Mitre link : CVE-2024-9831

CVE.ORG link : CVE-2024-9831


JSON object : View

Products Affected

taskbuilder

  • taskbuilder
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')