CVE-2023-1016
low-risk
Published 2023-06-09
The Intuitive Custom Post Order plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 3.1.4.1, due to insufficient escaping on the user supplied 'objects' and 'tags' parameters and lack of sufficient preparation in the 'update_options' function as well as the 'refresh' function which runs queries on the same values. This allows authenticated attackers, with administrator permissions, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Note that this attack may only be practical on configurations where it is possible to bypass addslashes due to the database using a nonstandard character set such as GBK.
Do I need to act?
-
0.16% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.6/10
Medium
NETWORK
/ HIGH complexity
Affected Products (1)
Intuitive Custom Post Order
Affected Vendors
References (5)
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/dc878508-200d-4bc7-aa9...
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/dc878508-200d-4bc7-aa9...
26
/ 100
low-risk
Severity
20/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal