Lucene search

K
attackerkbAttackerKBAKB:709DAE2D-2952-4B3C-83D8-7E94508429A2
HistoryApr 02, 2019 - 12:00 a.m.

CVE-2019-10692

2019-04-0200:00:00
attackerkb.com
11

0.973 High

EPSS

Percentile

99.9%

In the wp-google-maps plugin before 7.11.18 for WordPress, includes/class.rest-api.php in the REST API does not sanitize field names before a SELECT statement.

Recent assessments:

rootOptional at March 09, 2020 9:03pm UTC reported:

This CVE is fairly obscure due to it being present in the WordPress plugin google-maps in versions between 7.11.00 and 7.11.17.

The way this is exploited is the plugin does not sanitise field names before a select statement. This results in it being vulnerable to sql injection. This can be exploited to dump credentials and password hashes for users within the database resulting in potential account takeover if these hashes aren’t hashed correctly or if they use weak passwords.

For this, the plugin also needs to be out of date as it is easily patched by upgrading the plugin to the latest version. However, it isn’t uncommon to find outdated plugins within WordPress sites. There is also a Metasploit module designed to automate the exploitation process

Assessed Attacker Value: 3
Assessed Attacker Value: 3Assessed Attacker Value: 3

0.973 High

EPSS

Percentile

99.9%