This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis โ
Q1What is this vulnerability? (Essence + Consequences)
๐จ **Essence**: Time-based SQL Injection via `db` parameter. ๐ฅ **Consequences**: Full database compromise, data theft, and system takeover. Critical impact on Confidentiality, Integrity, and Availability.
Q2Root Cause? (CWE/Flaw)
๐ก๏ธ **Root Cause**: CWE-89 (SQL Injection). ๐ **Flaw**: Unsanitized input in the `db` parameter within `class-es-db-contacts.php`. Allows attackers to inject malicious SQL commands.
Q3Who is affected? (Versions/Components)
๐ฆ **Affected**: WordPress Plugin: **Email Subscribers by Icegram Express**. ๐ **Version**: v5.7.23 and **earlier** versions. ๐ **Vendor**: Icegram.
Q4What can hackers do? (Privileges/Data)
๐ฎ **Privileges**: No authentication required (PR:N). ๐ **Data**: High impact (C:H, I:H, A:H). Hackers can read, modify, or delete all database contents. ๐พ **Scope**: User data, emails, and plugin settings exposed.
๐ **Public Exp?**: No specific PoC code provided in data. ๐ **References**: WordFence and WordPress Trac links available. โ ๏ธ **Status**: CVSS 8.6 indicates high exploitability potential, even without public code.
Q7How to self-check? (Features/Scanning)
๐ **Check**: Scan for plugin **Email Subscribers by Icegram Express**. ๐ **Version**: Verify if version โค 5.7.23. ๐ ๏ธ **Tool**: Use vulnerability scanners detecting CWE-89 in WordPress plugins.โฆ
โ **Fixed**: Yes. ๐ **Date**: Published 2024-06-21. ๐ **Patch**: Update to latest version via WordPress Trac changeset 3101638. ๐ก๏ธ **Action**: Immediate update recommended.
Q9What if no patch? (Workaround)
๐ง **Workaround**: If update delayed, **disable** the plugin immediately. ๐ซ **Remove**: Delete plugin files if not needed. ๐ก๏ธ **WAF**: Use Web Application Firewall to block SQL injection patterns in `db` parameter.โฆ