This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: SQL Injection (SQLi) in FormLift plugin. π₯ **Consequences**: Attackers can extract sensitive database info. The app fails to escape user input properly, allowing malicious SQL queries to run.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: CWE-89 (SQL Injection). π **Flaw**: Insufficient escaping of the `form_id` parameter. Lack of prepared statements in the existing SQL query logic.
Q3Who is affected? (Versions/Components)
π’ **Vendor**: Adrian Tobey. π¦ **Product**: FormLift for Infusionsoft Web Forms. π **Affected**: Versions **7.5.17 and earlier**. WordPress platform users are at risk.
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Hackers' Power**: Unauthenticated access. π **Data Risk**: Extract sensitive information from the database. π **Action**: Append additional SQL queries to existing ones. High Confidentiality impact.
π **Exploit Status**: Yes, public PoC exists. π **Source**: ProjectDiscovery Nuclei templates available on GitHub. π **Wild Exploitation**: Likely, given low barrier to entry.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for `form_id` parameter injection. π οΈ **Tool**: Use Nuclei with the specific CVE-2024-38773 template. π **Verify**: Check if the plugin version is β€ 7.5.17.