SQL Injection Vulnerability in Burst Statistics Plugin for WordPress
CVE-2024-0405

7.2HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
17 January 2024

Summary

The Burst Statistics plugin for WordPress, specifically version 1.5.3, exhibits a vulnerability that allows authenticated attackers with editor privileges to perform Post-Authenticated SQL Injection. This issue arises at the /wp-json/burst/v1/data/compare endpoint due to insufficient escaping of user-supplied parameters and poorly prepared SQL queries. Key parameters susceptible to exploitation include 'browser', 'device', 'page_id', 'page_url', 'platform', and 'referrer'. Attackers can manipulate these inputs to inject and execute custom SQL queries, potentially allowing access to confidential data stored in the database.

Affected Version(s)

Burst Statistics – Privacy-Friendly Analytics for WordPress * <= 1.5.3

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ivan Spiridonov
.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.