CVE-2021-24931
CRITICAL EXPLOITED NUCLEIWordpress Secure Copy Content Protection and Content Locking sccp_id Unauthenticated SQLi
Title source: metasploitDescription
The Secure Copy Content Protection and Content Locking WordPress plugin before 2.8.2 does not escape the sccp_id parameter of the ays_sccp_results_export_file AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an SQL injection.
Exploits (2)
metasploit
WORKING POC
by h00die, Hacker5preme (Ron Jost), Krzysztof Zając (kazet) · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/wp_secure_copy_content_protection_sqli.rb
Nuclei Templates (1)
WordPress Secure Copy Content Protection and Content Locking <2.8.2 - SQL Injection
CRITICALVERIFIEDby theamanrawat
Scores
CVSS v3
9.8
EPSS
0.7197
EPSS Percentile
98.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2023-11-22
Classification
CWE
CWE-89
Status
published
Affected Products (1)
ays-pro/secure_copy_content_protection_and_content_locking
< 2.8.2
Timeline
Published
Dec 06, 2021
Tracked Since
Feb 18, 2026