Vulnerability Details : CVE-2022-21661
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to improper sanitization in WP_Query, there can be cases where SQL injection is possible through plugins or themes that use it in a certain way. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this vulnerability.
Vulnerability category: Sql Injection
Exploit prediction scoring system (EPSS) score for CVE-2022-21661
Probability of exploitation activity in the next 30 days: 93.82%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-21661
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
[email protected] |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
[email protected] |
8.0
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H |
1.3
|
6.0
|
[email protected] |
CWE ids for CVE-2022-21661
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.Assigned by:
- [email protected] (Primary)
- [email protected] (Secondary)
References for CVE-2022-21661
-
https://www.zerodayinitiative.com/advisories/ZDI-22-020/
Third Party Advisory;VDB Entry
-
https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html
Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/
Third Party Advisory
-
https://www.debian.org/security/2022/dsa-5039
Third Party Advisory
-
http://packetstormsecurity.com/files/165540/WordPress-Core-5.8.2-SQL-Injection.html
Exploit;Third Party Advisory;VDB Entry
-
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-6676-cqfm-gw84
Third Party Advisory
-
https://github.com/WordPress/wordpress-develop/commit/17efac8c8ec64555eff5cf51a3eff81e06317214
Patch;Third Party Advisory
-
https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/
Release Notes;Vendor Advisory
-
https://www.exploit-db.com/exploits/50663
Exploit;Third Party Advisory;VDB Entry
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/
Third Party Advisory
Products affected by CVE-2022-21661
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*