CVE-2022-0651
WP Statistics <= 13.1.5 Unauthenticated Blind SQL Injection via current_page_type
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the current_page_type parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5.
El plugin WP Statistics de WordPress es vulnerable a una inyección SQL debido a un escape y parametrización insuficientes del parámetro current_page_type encontrado en el archivo ~/includes/class-wp-statistics-hits.php, permitiendo a atacantes no autenticados inyectar consultas SQL arbitrarias para obtener información confidencial, en versiones hasta la 13.1.5 incluyéndola
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-02-16 CVE Reserved
- 2022-02-16 CVE Published
- 2024-08-02 CVE Updated
- 2024-08-02 First Exploit
- 2025-01-16 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-0651 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042 | 2024-08-02 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Veronalabs Search vendor "Veronalabs" | Wp Statistics Search vendor "Veronalabs" for product "Wp Statistics" | <= 13.1.5 Search vendor "Veronalabs" for product "Wp Statistics" and version " <= 13.1.5" | wordpress |
Affected
|