CVSS Summary
Score | 3.6 Low |
---|---|
Vector | Network |
Complexity | High |
Authentication | Single |
Confidentiality | Partial |
Integrity | None |
Availability | Partial |
Last revised:
An attacker with an admin account is able to add arbitrary text in the “Audited content types” option by using a DOM inspector to modify the value of a checkbox field. This text is then inserted into an SQL query and executed as part of a daily wp-cron job.
The fact that this is run only once a day makes it rather minor. An attacker would potentially need to poll /wp-cron.php repeatedly for 24 hours until they got the first result. As blind SQL injection attacks are usually done by comparing the first character to all possible characters – one at a time, until a match is found – it would take a very long time to exfiltrate useful data.
However, we don’t discount the possibility that someone cleverer than us could figure out a more practical attack.
Current state: Fixed
Score | 3.6 Low |
---|---|
Vector | Network |
Complexity | High |
Authentication | Single |
Confidentiality | Partial |
Integrity | None |
Availability | Partial |
Steps an attacker may take:
Steps to take to verify that this issue exists:
You should update to version 1.62.