This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Time-based SQL Blind Injection in `db` parameter. π **Consequences**: Full database compromise, data theft, and system integrity loss. Critical impact on confidentiality, integrity, and availability.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: CWE-89 (SQL Injection). β οΈ **Flaw**: Unsanitized input in the `db` parameter allows attackers to inject malicious SQL logic, exploiting time delays to extract data.
Q3Who is affected? (Versions/Components)
π― **Affected**: WordPress Plugin: **Email Subscribers by Icegram Express**. π¦ **Version**: v5.7.25 and **all prior versions**. π’ **Vendor**: Icegram.
Q4What can hackers do? (Privileges/Data)
π **Attacker Actions**: Extract sensitive data (users, emails, configs). π **Privileges**: High impact (CVSS H). Can manipulate database content, potentially leading to full site takeover or massive data leaks.
π **Public Exp?**: No specific PoC code provided in data. π **Wild Exploitation**: Likely high due to low barrier to entry (No auth, simple vector). WordFence has tracked it as a threat.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for plugin version `Email Subscribers` < 5.7.25. π οΈ **Tools**: Use WPScan or manual parameter fuzzing on `db` inputs to detect time-based delays.β¦
β **Fixed?**: Yes. π’ **Patch**: Update to version **> 5.7.25**. π **Source**: Official WordPress plugin repository and vendor updates. Changeset 3107964 addresses the issue.
Q9What if no patch? (Workaround)
π§ **No Patch Workaround**: Disable the plugin immediately if update is impossible. π« **Block**: Restrict access to plugin endpoints via WAF. π§Ή **Audit**: Review database logs for suspicious time-delay queries.
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **CRITICAL**. π¨ **Priority**: Patch **IMMEDIATELY**. High CVSS score (H/H/H) + No Auth required = High risk of automated exploitation. Do not delay.