CVSS Summary
| Score | 3.6 Low |
|---|---|
| Vector | Network |
| Complexity | High |
| Authentication | Single |
| Confidentiality | Partial |
| Integrity | None |
| Availability | Partial |
Last revised:
An attacker with an admin account is able to add arbitrary text in the “Audited content types” option by using a DOM inspector to modify the value of a checkbox field. This text is then inserted into an SQL query and executed as part of a daily wp-cron job.
The fact that this is run only once a day makes it rather minor. An attacker would potentially need to poll /wp-cron.php repeatedly for 24 hours until they got the first result. As blind SQL injection attacks are usually done by comparing the first character to all possible characters – one at a time, until a match is found – it would take a very long time to exfiltrate useful data.
However, we don’t discount the possibility that someone cleverer than us could figure out a more practical attack.
Current state: Fixed
| Score | 3.6 Low |
|---|---|
| Vector | Network |
| Complexity | High |
| Authentication | Single |
| Confidentiality | Partial |
| Integrity | None |
| Availability | Partial |
Steps an attacker may take:
Steps to take to verify that this issue exists:
You should update to version 1.62.