CVE-2021-24750

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker, even with a low-level user role like a subscriber, to execute SQL injection attacks, which means they could manipulate the database to access or alter sensitive information. The issue arises from the plugin not properly cleaning up user input in a specific function, making it accessible to any authenticated user.

Technical Description

The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$4,789($1K-$5K)
Vendor Response
Grade FPatched in 1536 days

Quick Information

Published

Dec 21, 2021

over 4 years ago

Last Modified

Mar 6, 2026

about 1 month ago

Vendor

codepress

Product

visitor statistics

Related Vulnerabilities

CVE-2024-24867High

This vulnerability allows an attacker to access sensitive information from the WP Visitor Statistics plugin, potentially exposing user data and site activity. It affects versions up to 6.9.4, so sites using this plugin without updates are at risk.

CVE-2023-0600Critical

This vulnerability allows attackers to execute unauthorized SQL commands on the database of websites using the WP Visitor Statistics plugin, potentially exposing sensitive data. It can be exploited by anyone visiting the site, as no authentication is required to launch the attack.

CVE-2022-4656Medium

This vulnerability allows an attacker with a low-level user role, like a contributor, to inject malicious scripts into the website, potentially leading to unauthorized actions or data theft. It occurs because the plugin fails to properly check and clean up certain inputs, making it easier for attackers to exploit.

CVE-2022-33965Critical

This vulnerability allows an attacker to access and manipulate the database of a WordPress site using the Osamaesh WP Visitor Statistics plugin, potentially exposing sensitive information or altering data. It can be exploited without needing to log in, making it particularly dangerous for any site using this plugin version 5.7 or earlier.

CVE-2022-0410High

This vulnerability allows an attacker with an authenticated user account to manipulate the database by injecting malicious SQL code through a poorly handled parameter in the WP Visitor Statistics plugin. If exploited, this could lead to unauthorized access to sensitive data or even complete control over the database.