The SQL injection vulnerability in the Hide My WP WordPress plugin (versions <= 6.2.3) is possible because of how the IP address is retrieved and used inside a SQL query. The function "hmwp_get_user_ip" tries to retrieve the IP address from multiple headers, including IP address headers that the user can spoof, such as "X-Forwarded-For." As a result, the malicious payload supplied in one of these IP address headers will be directly inserted into the SQL query, making SQL injection possible.
References
Link | Resource |
---|---|
https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158 | Product |
https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability | Patch Third Party Advisory |
https://patchstack.com/hide-my-wp-vulnerabilities-fixed/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Patchstack
Published: 2021-11-24T00:00:00
Updated: 2021-11-24T16:29:41
Reserved: 2021-07-19T00:00:00
Link: CVE-2021-36916
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-11-24T17:15:07.857
Modified: 2021-11-26T15:49:12.297
Link: CVE-2021-36916
JSON object: View
Redhat Information
No data.
CWE