CVE-2021-24341

8.8 HIGH

📋 TL;DR

This SQL injection vulnerability in the Xllentech English Islamic Calendar WordPress plugin allows attackers to execute arbitrary SQL commands when deleting dates. Attackers can potentially read, modify, or delete database content. WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Xllentech English Islamic Calendar WordPress Plugin
Versions: Versions before 2.6.8
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. The delete date functionality must be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, modification, or deletion; potential privilege escalation to WordPress administrator; possible remote code execution via database functions.

🟠

Likely Case

Unauthorized data access, modification of calendar entries, potential extraction of sensitive WordPress user data or configuration information.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only affecting calendar data tables.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the date deletion functionality. Public proof-of-concept exists in vulnerability disclosures.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.8

Vendor Advisory: https://wordpress.org/plugins/xllentech-english-islamic-calendar/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Xllentech English Islamic Calendar'. 4. Click 'Update Now' if available. 5. If update not available, download version 2.6.8+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate xllentech-english-islamic-calendar

Web Application Firewall Rule

all

Block SQL injection patterns targeting year_number and month_number parameters

🧯 If You Can't Patch

  • Restrict access to WordPress admin panel and plugin functionality
  • Implement database-level protections: use least privilege database accounts, enable query logging

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin → Plugins → Xllentech English Islamic Calendar. If version is below 2.6.8, you are vulnerable.

Check Version:

wp plugin get xllentech-english-islamic-calendar --field=version

Verify Fix Applied:

Confirm plugin version is 2.6.8 or higher. Test date deletion functionality with SQL injection test payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts following plugin access
  • Unexpected database errors in WordPress debug logs

Network Indicators:

  • POST requests to wp-admin/admin-ajax.php with SQL injection patterns in year_number/month_number parameters

SIEM Query:

source="web_server" AND (uri_path="*/wp-admin/admin-ajax.php*" AND (request_body="*year_number*" OR request_body="*month_number*") AND request_body MATCHES "*[';]|UNION|SELECT|INSERT|UPDATE|DELETE|DROP*")

🔗 References

📤 Share & Export