CVE-2021-24555
EUVD-2021-1146723.08.2021, 12:15
The daac_delete_booking_callback function, hooked to the daac_delete_booking AJAX action, takes the id POST parameter which is passed into the SQL statement without proper sanitisation, validation or escaping, leading to a SQL Injection issue. Furthermore, the ajax action is lacking any CSRF and capability check, making it available to any authenticated user.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| roosty | diary-availability-calendar | 𝑥 ≤ 1.0.3 |
𝑥
= Vulnerable software versions
References