The SQL injection vulnerability in the Hide My WP WordPress plugin (versions <= 6.2.3) is possible because of how the IP address is retrieved and used inside a SQL query. The function "hmwp_get_user_ip" tries to retrieve the IP address from multiple headers, including IP address headers that the user can spoof, such as "X-Forwarded-For." As a result, the malicious payload supplied in one of these IP address headers will be directly inserted into the SQL query, making SQL injection possible.
References
Link | Resource |
---|---|
https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158 | Product |
https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability | Patch Third Party Advisory |
https://patchstack.com/hide-my-wp-vulnerabilities-fixed/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-11-24 17:15
Updated : 2021-11-26 15:49
NVD link : CVE-2021-36916
Mitre link : CVE-2021-36916
CVE.ORG link : CVE-2021-36916
JSON object : View
Products Affected
wpwave
- hide_my_wp
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')