CVE-2021-25076

HIGH EXPLOITED

WP User Frontend <3.5.26 - SQL Injection

Title source: llm

Description

The WP User Frontend WordPress plugin before 3.5.26 does not validate and escape the status parameter before using it in a SQL statement in the Subscribers dashboard, leading to an SQL injection. Due to the lack of sanitisation and escaping, this could also lead to Reflected Cross-Site Scripting

Exploits (5)

exploitdb WORKING POC
by Ron Jost · pythonwebappsphp
https://www.exploit-db.com/exploits/50772
nomisec WORKING POC 3 stars
by abbarhissarh · poc
https://github.com/abbarhissarh/CVE-2021-25076
nomisec WORKING POC 3 stars
by ar2o3 · poc
https://github.com/ar2o3/CVE-2021-25076
vulncheck_xdb WORKING POC
remote-auth
https://github.com/0xAbbarhSF/CVE-2021-25076
inthewild WORKING POC
poc
https://github.com/0xabbarhsf/cve-2021-25076

Scores

CVSS v3 8.8
EPSS 0.5233
EPSS Percentile 97.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2021-12-21
CWE
CWE-89
Status published
Products (1)
wedevs/wp_user_frontend < 3.5.26
Published Jan 24, 2022
Tracked Since Feb 18, 2026