Posted on Leave a comment

Blind sql injection vulnerability on WP statistics plugin on WordPress.

Security researchers from Wordfence has identified a blind sql injection vulnerability on WP statistics plugin from WordPress. 6,00,000 sites are impacted due to this vulnerability.

The security researchers from Wordfence has identified a blind sql injection vulnerability on WP statistic plugin from WordPress applications which can be exploited by an unauthenticated attacker.

WP Statistics is a wordpress plugin which allows the site owners to see the site visitors of their site. “Pages” menu item in WP statistics generates the SQL queries to fetch the visitors details along with the most visitors on each pages. Security researchers reported-

“While the “Pages” page was intended for administrators only and would not display information to non-admin users, it was possible to start loading this page’s constructor by sending a request to wp-admin/admin.php with the page parameter set to wps_pages_page. Since the SQL query ran in the constructor for the “Pages” page, this meant that any site visitor, even those without a login, could cause this SQL query to run. A malicious actor could then supply malicious values for the ID or type parameters.”

Additional details:

Description: Unauthenticated Time-Based Blind SQL Injection
Affected Plugin: WP Statistics
Plugin Slug: wp-statistics
Affected Versions: < 13.0.8
CVE ID: CVE-2021-24340
CVSS Score: 7.5 (High)
CVSS Vector:CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Fully Patched Version: 13.0.8

Timeline of vulnerability disclosure:

March 13, 2021 – The Wordfence Threat Intelligence team finishes researching a vulnerability in the WP Statistics plugin and contacts VeronaLabs. VeronaLabs responds and we provide full disclosure.
March 15, 2021 – VeronaLabs replies with a fixed version for us to test and we verify that it corrects the issue.
March 25, 2021 – A patched version of the plugin, 13.0.8, is released.

–For more Cyber security news in crisp content . Please follow our site

Leave a Reply