Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2023-6567 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Time-based SQL Injection in LearnPress plugin. πŸ’₯ **Consequences**: Attackers can steal sensitive DB data, compromise site integrity, and potentially take over the server.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-89 (SQL Injection). πŸ› **Flaw**: Insufficient escaping of the `order_by` parameter + lack of prepared statements. The code blindly trusts user input when building SQL queries.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: WordPress Plugin **LearnPress**. πŸ“¦ **Versions**: 4.2.5.7 and earlier. 🏒 **Vendor**: ThimPress. If you run an LMS site with this plugin, you are at risk.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Hackers Can**: Extract `user_pass` hashes, dump entire database tables, and escalate privileges. πŸ“‚ **Data at Risk**: User credentials, course data, and potentially admin secrets. Full database access is possible.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: LOW. 🚫 **Auth Required**: None (Unauthenticated). 🌐 **Access**: Remote. Any visitor can trigger the exploit via the `/wp-json/lp/v1/courses/` endpoint. No login needed.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exp?**: YES. πŸ“œ **PoC**: Available on GitHub (mimiloveexe/CVE-2023-6567-poc). πŸ› οΈ **Tools**: Works with `sqlmap` using the `-r` flag. Wild exploitation is highly likely given the ease of use.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for `order_by` parameter in LearnPress API endpoints. πŸ“‘ **Detection**: Use Nuclei templates (projectdiscovery). πŸ§ͺ **Test**: Send time-delay payloads via `order_by` to detect blind SQLi responses.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fixed?**: YES. πŸ“’ **Patch**: Update LearnPress to version > 4.2.5.7. πŸ”„ **Action**: Check WordPress plugin updates immediately. The vendor released a fix in changeset 3013957.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Disable the LearnPress plugin temporarily. πŸ›‘ **Mitigation**: Block `/wp-json/lp/v1/` endpoints via WAF if possible. 🚫 **Best**: Remove the plugin if not actively used. Do not leave it exposed.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: CRITICAL. 🚨 **Priority**: Patch IMMEDIATELY. CVSS Score is High (3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Unauthenticated access makes this a top-tier threat. Act now!