This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: SQL Injection (SQLi) in 'Daily Prayer Time' plugin. π **Consequences**: Attackers can steal, modify, or delete database content. π₯ **Impact**: Full compromise of the WordPress site's data integrity.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **CWE**: CWE-89 (SQL Injection). π **Flaw**: The plugin fails to sanitize/escape the `month` parameter. π **Context**: This happens inside the `get_monthly_timetable` AJAX action before using it in a SQL statement.
Q3Who is affected? (Versions/Components)
π¦ **Product**: WordPress Plugin 'Daily Prayer Time'. π **Affected Versions**: Versions prior to **2022.03.01**. π **Platform**: WordPress sites running this specific plugin.
Q4What can hackers do? (Privileges/Data)
π **Hackers Can**: Execute arbitrary SQL commands. ποΈ **Data Access**: Read sensitive database info (users, configs). βοΈ **Actions**: Modify or delete critical site data. πͺ **Access**: No login required!
Q5Is exploitation threshold high? (Auth/Config)
π **Auth**: **Unauthenticated**. π **Threshold**: **LOW**. Anyone on the internet can trigger the `get_monthly_timetable` AJAX endpoint. No credentials needed to start exploitation.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **PoC Available**: Yes. π **Source**: Nuclei templates (projectdiscovery). π **Wild Exploit**: High risk due to low barrier to entry. Automated scanners likely detect this.
Q7How to self-check? (Features/Scanning)
π **Check**: Scan for the plugin 'Daily Prayer Time'. π§ͺ **Test**: Trigger `get_monthly_timetable` AJAX with malicious `month` payloads. π οΈ **Tool**: Use Nuclei or SQLMap to verify the injection point.
Q8Is it fixed officially? (Patch/Mitigation)
π§ **Fix**: Upgrade to version **2022.03.01** or later. β **Status**: Patched. The developers fixed the sanitization issue in the newer release.
Q9What if no patch? (Workaround)
π« **No Patch?**: Disable the plugin immediately. π **Mitigation**: Block access to `admin-ajax.php` if possible, or use a WAF to filter SQLi patterns in the `month` parameter.
Q10Is it urgent? (Priority Suggestion)
β‘ **Priority**: **HIGH**. π’ **Reason**: Unauthenticated access makes it easy to exploit. π **Age**: Published in 2022, but still relevant for unpatched legacy sites. Act now!