wpDataTables (Premium) <= 3.4.1 - Blind SQL Injection via start Parameter

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE CVE-2021-24199
CVSS Medium (6.5)
Publicly Published March 16, 2021
Last Updated January 22, 2024
Researcher Veno Eivazian, Massimiliano Ferraresi
Description

The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'start' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application. Please note that this only affects the premium version of the plugin which shares the same slug as the free version.

References

1 affected software package

Software Type Plugin
Software Slug wpdatatables (view on wordpress.org)
Patched? Yes
Affected Version
  • <= 3.4.2
Patched Version
  • 3.4.2
This record contains material that is subject to copyright

Copyright 2012-2026 Defiant Inc.
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. License Detail.