This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: SQL Injection in WordPress 'Title Experiments Free' plugin. π₯ **Consequences**: Attackers can steal data, modify content, or hijack admin accounts via unsanitized input.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **CWE-89**: Improper Neutralization of Special Elements used in an SQL Command. π **Flaw**: The `id` parameter in `wpex_titles` AJAX action is not escaped before SQL execution.
Q3Who is affected? (Versions/Components)
π¦ **Product**: WordPress Plugin 'Title Experiments Free'. π **Affected**: Versions **before 9.0.1**. β **Fixed**: Version 9.0.1 and later.
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Privileges**: **Unauthenticated** access required. π **Impact**: Can obtain sensitive info, modify database data, or execute unauthorized admin operations.
Q5Is exploitation threshold high? (Auth/Config)
β‘ **Threshold**: **LOW**. No login needed! The vulnerability is exposed via an AJAX action available to **anyone** on the internet.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Exploit**: Yes. Public PoC exists via **Nuclei Templates** (ProjectDiscovery). Wild exploitation is highly likely due to ease of use.
Q7How to self-check? (Features/Scanning)
π **Check**: Scan for the plugin 'Title Experiments Free'. π§ͺ **Test**: Send crafted SQL payloads to the `wpex_titles` AJAX endpoint with an `id` parameter.
Q8Is it fixed officially? (Patch/Mitigation)
π§ **Fix**: Update the plugin to **version 9.0.1 or higher**. The developer has released a patch to sanitize the input.
Q9What if no patch? (Workaround)
π« **Workaround**: If you can't update, **disable or delete** the plugin immediately. π Block access to `wp-admin/admin-ajax.php` for this specific action if possible.
Q10Is it urgent? (Priority Suggestion)
π₯ **Priority**: **CRITICAL**. Unauthenticated SQLi is a high-severity threat. Patch immediately to prevent data breaches and site compromise.