The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 3.25.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This requires an unauthenticated user to have been given permission to view form submissions, and the form submission shortcode be added to a page.
Metrics
Affected Vendors & Products
References
History
Thu, 05 Jun 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dynamiapps
Dynamiapps frontend Admin |
|
CPEs | cpe:2.3:a:dynamiapps:frontend_admin:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Dynamiapps
Dynamiapps frontend Admin |
Sat, 28 Dec 2024 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 21 Dec 2024 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 3.25.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This requires an unauthenticated user to have been given permission to view form submissions, and the form submission shortcode be added to a page. | |
Title | Frontend Admin by DynamiApps <= 3.25.1 - Unauthenticated SQL Injection | |
Weaknesses | CWE-89 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2024-12-21T09:23:55.317Z
Updated: 2024-12-28T00:49:07.590Z
Reserved: 2024-11-25T19:09:37.354Z
Link: CVE-2024-11722

Updated: 2024-12-23T16:40:59.070Z

Status : Analyzed
Published: 2024-12-21T10:15:07.367
Modified: 2025-06-05T15:31:37.450
Link: CVE-2024-11722

No data.