WP Meta SEO < 4.5.3 - Subscriber+ SQLi
CVE-2023-0875
8.8HIGH
Key Information:
- Vendor
- Wordpress
- Status
- Vendor
- CVE Published:
- 20 March 2023
Badges
👾 Exploit Exists🟡 Public PoC
Summary
The WP Meta SEO WordPress plugin, prior to version 4.5.3, contains a flaw that fails to correctly sanitize and escape inputs into SQL queries. This oversight permits unauthorized users with subscriber-level access to execute blind SQL injection attacks, potentially accessing sensitive database information and compromising the integrity of the application.
Affected Version(s)
WP Meta SEO 0 < 4.5.3
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
dc11
WPScan