{"vulnerability": "cve-2021-32789", "sightings": [{"uuid": "ad3f8cf2-4ca5-4f1e-bbb3-43577d251c4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32789", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4617", "content": "#exploit\nCVE-2021-32789:\nWooCommerce exploit\nhttps://github.com/andnorack/CVE-2021-32789", "creation_timestamp": "2021-10-28T11:07:01.000000Z"}, {"uuid": "5c80bd7e-3c7e-4c2e-b05c-ddb0fa627e6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32789", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2021/CVE-2021-32789.yaml", "content": "", "creation_timestamp": "2023-04-27T09:58:59.000000Z"}, {"uuid": "5c41766f-1038-4eca-8783-20651635c526", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32789", "type": "seen", "source": "https://t.me/cibsecurity/26495", "content": "\u203c CVE-2021-32789 \u203c\n\nwoocommerce-gutenberg-products-block is a feature plugin for WooCommerce Gutenberg Blocks. An SQL injection vulnerability impacts all WooCommerce sites running the WooCommerce Blocks feature plugin between version 2.5.0 and prior to version 2.5.16. Via a carefully crafted URL, an exploit can be executed against the `wc/store/products/collection-data?calculate_attribute_counts[][taxonomy]` endpoint that allows the execution of a read only sql query. There are patches for many versions of this package, starting with version 2.5.16. There are no known workarounds aside from upgrading.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-26T20:11:30.000000Z"}]}