This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: SQL Injection in 'Subscribe to Category' plugin. π₯ **Consequences**: Attackers can inject malicious SQL queries to extract sensitive database info. The lack of input validation allows data leakage.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **CWE-89**: Improper Neutralization of Special Elements used in an SQL Command. π **Flaw**: Insufficient escaping on user-supplied parameters + lack of prepared statements in existing SQL queries.
Q3Who is affected? (Versions/Components)
π¦ **Product**: WordPress Plugin 'Subscribe to Category'. π€ **Vendor**: Daniel SΓΆderstrΓΆm / Sidney van de Stouwe. π **Affected**: Versions <= 2.7.4.
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Privileges**: Unauthenticated access required. ποΈ **Data**: Can extract sensitive information from the database via appended SQL queries. High impact on Confidentiality (C:H).
π₯ **Public Exp**: YES. π **PoC**: Available on GitHub (RandomRobbieBF/CVE-2023-32590). π§ͺ **Scanner**: Nuclei templates exist. Wild exploitation is possible.
Q7How to self-check? (Features/Scanning)
π **Check**: Scan for 'Subscribe to Category' plugin version. π οΈ **Tool**: Use Nuclei or manual SQL injection testing on category subscription endpoints. Look for version <= 2.7.4.
π§ **Workaround**: Disable the plugin if not needed. π« **Block**: Restrict access to plugin endpoints via WAF. π **Mitigate**: Input validation at application level if patching is delayed.
Q10Is it urgent? (Priority Suggestion)
π΄ **Priority**: HIGH. π **Urgency**: Critical due to unauthenticated nature and public PoC. Immediate patching or mitigation required to prevent data breach.