CVE-2021-24762
CRITICAL EXPLOITED IN THE WILD NUCLEIThe Perfect Survey WP <1.5.2 - SQL Injection
Title source: llmDescription
The Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.
Exploits (4)
metasploit
WORKING POC
by Aaryan Golatkar, Ron Jost · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/wp_perfect_survey_sqli.rb
Nuclei Templates (1)
WordPress Perfect Survey <1.5.2 - SQL Injection
CRITICALby cckuailong
Scores
CVSS v3
9.8
EPSS
0.8568
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2022-08-19
InTheWild.io
2022-08-19
Classification
CWE
CWE-89
Status
published
Affected Products (1)
getperfectsurvey/perfect_survey
< 1.5.2
Timeline
Published
Feb 01, 2022
Tracked Since
Feb 18, 2026