The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 06 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codepress
Codepress visitor Statistics |
|
| CPEs | cpe:2.3:a:codepress:visitor_statistics:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wp Visitor Statistics \(real Time Traffic\) Project
Wp Visitor Statistics \(real Time Traffic\) Project wp Visitor Statistics \(real Time Traffic\) |
Codepress
Codepress visitor Statistics |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T19:42:16.622Z
Reserved: 2021-01-14T00:00:00.000Z
Link: CVE-2021-24750
No data.
Status : Modified
Published: 2021-12-21T09:15:06.987
Modified: 2026-03-06T19:17:59.403
Link: CVE-2021-24750
No data.
OpenCVE Enrichment
No data.
Weaknesses