The Popup Builder plugin 2.2.8 through 2.6.7.6 for WordPress is vulnerable to SQL injection (in the sgImportPopups function in sg_popup_ajax.php) via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable. This allows creation of an arbitrary WordPress Administrator account, leading to possible Remote Code Execution because Administrators can run PHP code on Wordpress instances. (This issue has been fixed in the 3.x branch of popup-builder.)
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/popup-builder/tags/2.2.8/files/sg_popup_ajax.php#L69 | Exploit Third Party Advisory |
https://wordpress.org/plugins/popup-builder/#developers | Release Notes |
https://wpvulndb.com/vulnerabilities/10073 | Third Party Advisory |
https://zeroauth.ltd/blog/2020/02/16/cve-2020-9006-popup-builder-wp-plugin-sql-injection-via-php-deserialization/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-02-17T14:33:25
Updated: 2020-02-17T19:06:05
Reserved: 2020-02-16T00:00:00
Link: CVE-2020-9006
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-02-17T15:15:12.023
Modified: 2021-07-21T11:39:23.747
Link: CVE-2020-9006
JSON object: View
Redhat Information
No data.