CVE-2021-24762

CRITICAL EXPLOITED IN THE WILD NUCLEI

The Perfect Survey WP <1.5.2 - SQL Injection

Title source: llm

Description

The Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.

Exploits (4)

nomisec WORKING POC
by c4cnm · remote
https://github.com/c4cnm/Exploit_CVE-2021-24762
nomisec WRITEUP
by NT1410 · poc
https://github.com/NT1410/CVE-2021-24762
exploitdb WORKING POC
by Ron Jost · pythonwebappsphp
https://www.exploit-db.com/exploits/50766
metasploit WORKING POC
by Aaryan Golatkar, Ron Jost · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/wp_perfect_survey_sqli.rb

Nuclei Templates (1)

WordPress Perfect Survey <1.5.2 - SQL Injection
CRITICALby cckuailong

Scores

CVSS v3 9.8
EPSS 0.8568
EPSS Percentile 99.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2022-08-19
InTheWild.io 2022-08-19

Classification

CWE
CWE-89
Status published

Affected Products (1)

getperfectsurvey/perfect_survey < 1.5.2

Timeline

Published Feb 01, 2022
Tracked Since Feb 18, 2026