CVE-2021-24862

HIGH NUCLEI

Wordpress RegistrationMagic task_ids Authenticated SQLi

Title source: metasploit

Description

The RegistrationMagic WordPress plugin before 5.0.1.6 does not escape user input in its rm_chronos_ajax AJAX action before using it in a SQL statement when duplicating tasks in batches, which could lead to a SQL injection issue

Exploits (2)

exploitdb WORKING POC
by Ron Jost · pythonwebappsphp
https://www.exploit-db.com/exploits/50686
metasploit WORKING POC
by h00die, Hacker5preme (Ron Jost) · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/wp_registrationmagic_sqli.rb

Nuclei Templates (1)

WordPress RegistrationMagic <5.0.1.6 - Authenticated SQL Injection
HIGHVERIFIEDby theamanrawat

Scores

CVSS v3 7.2
EPSS 0.3485
EPSS Percentile 97.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-89
Status published
Products (1)
metagauss/registrationmagic < 5.0.1.6
Published Jan 10, 2022
Tracked Since Feb 18, 2026