SQL Injection Vulnerability in Burst Statistics Plugin for WordPress
CVE-2024-0405
7.2HIGH
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 17 January 2024
Summary
The Burst Statistics plugin for WordPress, specifically version 1.5.3, exhibits a vulnerability that allows authenticated attackers with editor privileges to perform Post-Authenticated SQL Injection. This issue arises at the /wp-json/burst/v1/data/compare endpoint due to insufficient escaping of user-supplied parameters and poorly prepared SQL queries. Key parameters susceptible to exploitation include 'browser', 'device', 'page_id', 'page_url', 'platform', and 'referrer'. Attackers can manipulate these inputs to inject and execute custom SQL queries, potentially allowing access to confidential data stored in the database.
Affected Version(s)
Burst Statistics – Privacy-Friendly Analytics for WordPress * <= 1.5.3
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Ivan Spiridonov