CVE-2021-24862
HIGH NUCLEIWordpress RegistrationMagic task_ids Authenticated SQLi
Title source: metasploitDescription
The RegistrationMagic WordPress plugin before 5.0.1.6 does not escape user input in its rm_chronos_ajax AJAX action before using it in a SQL statement when duplicating tasks in batches, which could lead to a SQL injection issue
Exploits (2)
metasploit
WORKING POC
by h00die, Hacker5preme (Ron Jost) · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/wp_registrationmagic_sqli.rb
Nuclei Templates (1)
WordPress RegistrationMagic <5.0.1.6 - Authenticated SQL Injection
HIGHVERIFIEDby theamanrawat
References (3)
Scores
CVSS v3
7.2
EPSS
0.3485
EPSS Percentile
97.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-89
Status
published
Products (1)
metagauss/registrationmagic
< 5.0.1.6
Published
Jan 10, 2022
Tracked Since
Feb 18, 2026