SQL Injection Vulnerability in Intuitive Custom Post Order Plugin for WordPress
CVE-2023-1016

6.6MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
9 June 2023

Summary

The Intuitive Custom Post Order plugin for WordPress has a vulnerability that allows authenticated attackers with administrator permissions to exploit SQL Injection. The flaw is due to inadequate escaping of user-supplied parameters, specifically 'objects' and 'tags', in conjunction with insufficiently prepared queries in the 'update_options' and 'refresh' functions. This exploitation can allow attackers to append malicious SQL queries, potentially revealing sensitive information stored in the database. This vulnerability poses a significant risk, especially in environments where characteristics like character sets can lead to query manipulation.

Affected Version(s)

Intuitive Custom Post Order * <= 3.1.3

References

CVSS V3.1

Score:
6.6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.