vendor:
WordPress Core
by:
Aryan Chehreghani
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: WordPress Core
Affected Version From: < 5.8.3
Affected Version To: < 5.8.3
Patch Exists: YES
Related CWE: CVE-2022-21661
CPE: a:wordpress:wordpress
Tags: wp,sqli,wpquery,wpscan,packetstorm,cve,cve2022,wordpress
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Nuclei References:
https://wpscan.com/vulnerability/7f768bcf-ed33-4b22-b432-d1e7f95c1317, https://www.zerodayinitiative.com/blog/2022/1/18/cve-2021-21661-exposing-database-info-via-wordpress-sql-injection, http://packetstormsecurity.com/files/165540/WordPress-Core-5.8.2-SQL-Injection.html, https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-6676-cqfm-gw84, https://nvd.nist.gov/vuln/detail/cve-2022-21661
Nuclei Metadata: {'max-request': 1, 'verified': True, 'vendor': 'wordpress', 'product': 'wordpress'}
Platforms Tested: Windows 10
2022
WordPress Core 5.8.2 – ‘WP_Query’ SQL Injection
This vulnerability allows remote attackers to disclose sensitive information on affected installations of WordPress Core. Authentication is not required to exploit this vulnerability, The specific flaw exists within the WP_Query class. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
Mitigation:
Ensure that user-supplied strings are properly validated before using them to construct SQL queries.