WordPress Plugin Vulnerabilities

Elementor Website Builder < 3.12.2 - Admin+ SQLi

Description

The plugin does not properly sanitize and escape the Replace URL parameter in the Tools module before using it in a SQL statement, leading to a SQL injection exploitable by users with the Administrator role.

Proof of Concept

1. Go to Elementor > Tools > Replace URL
2. Fill the first field with `http://localhost:8000/`
3. Fill the second field with `http://localhost:8000/?test'),meta_key='key4'where+meta_id=SLEEP(2);#`
4. Note the additional time taken by the request, demonstrating the SQL injection vulnerability.

Affects Plugins

Fixed in 3.12.2

References

Classification

Type
SQLI
OWASP top 10
CWE

Miscellaneous

Original Researcher
Sanjay Das
Submitter
Sanjay Das
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2023-05-02 (about 7 months ago)
Added
2023-05-02 (about 6 months ago)
Last Updated
2023-05-02 (about 6 months ago)

Other