This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: SQL Injection (SQLi) in WordPress Plugin 'Create by Mediavine'. π₯ **Consequences**: Attackers can manipulate database queries via the `id` parameter.β¦
π‘οΈ **Root Cause**: CWE-89 (SQL Injection). π **Flaw**: Insufficient escaping of user-supplied parameters. Lack of proper SQL query preparation (parameterized queries) for the `id` input.
Q3Who is affected? (Versions/Components)
π¦ **Affected**: WordPress Plugin 'Create by Mediavine'. π **Versions**: 1.9.4 and earlier. π’ **Vendor**: mischiefmarmot (Mediavine). Built on PHP/MySQL architecture.
Q4What can hackers do? (Privileges/Data)
π **Attacker Capabilities**: Full database access. π **Impact**: High Confidentiality, Integrity, and Availability impact (CVSS H/H/H). Hackers can read sensitive data, alter records, or crash the database service.
Q5Is exploitation threshold high? (Auth/Config)
β‘ **Exploitation Threshold**: LOW. π **Auth**: None required (PR:N). π **Access**: Network accessible (AV:N). ποΈ **UI**: No user interaction needed (UI:N). Easy to exploit remotely.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exploit**: No specific PoC code provided in data. π **Wild Exploitation**: Unknown status. However, the vector is simple (SQLi via `id`), making custom exploits trivial for attackers.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for 'Create by Mediavine' plugin. π§ͺ **Test**: Inject SQL payloads into the `id` parameter of relevant endpoints. π‘ **Tools**: Use SQLMap or manual Burp Suite requests to test for error-based or bliβ¦
π οΈ **Official Fix**: Yes, a fix exists. π₯ **Action**: Update plugin to version > 1.9.4. π **Source**: WordPress Plugin Repository or Mediavine official channels. Check changeset 3056265 for details.
Q9What if no patch? (Workaround)
π§ **No Patch Workaround**: Disable the plugin immediately if update is impossible. π **Mitigation**: Implement WAF rules to block SQL injection patterns in the `id` parameter.β¦