Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2022-0412 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SQL Injection (SQLi) in WordPress plugin. πŸ’₯ **Consequences**: Attackers can manipulate database queries, leading to data theft or site compromise.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-89 (SQL Injection). πŸ› **Flaw**: The `item_id` parameter in the REST endpoint is **not sanitized or escaped** before SQL execution.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **TI WooCommerce Wishlist** plugin. πŸ“… **Version**: Before **1.40.1**. 🏒 **Vendor**: TemplateInvaders.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Execute arbitrary SQL commands. πŸ“Š **Impact**: Extract sensitive data, modify database content, or potentially gain further system access.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **LOW**. 🚫 **Auth**: **Unauthenticated**. No login required to exploit via the REST endpoint.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exp?**: **YES**. πŸ“‚ **PoCs**: Available on GitHub (e.g., `CVE-2022-0412_Exploit`, `Vulnpire/CVE-2022-0412`) and Nuclei templates.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Use scanners like **Nuclei** with the specific CVE template. πŸ“‘ **Target**: Check for the `wishlist/remove_product` REST endpoint vulnerability.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: **YES**. πŸ“₯ **Action**: Update **TI WooCommerce Wishlist** to version **1.40.1** or later. πŸ“ **Ref**: WordPress Trac changeset 2668899.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Disable the plugin temporarily. πŸ›‘ **Mitigation**: Block access to the `wishlist/remove_product` REST endpoint via WAF or server config.

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **HIGH**. πŸ”₯ **Reason**: Unauthenticated + Public Exploits + Critical Data Risk. Patch immediately!