This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Unauthenticated SQL Injection in WordPress plugin 'Course Booking System'. π₯ **Consequences**: Attackers can extract sensitive database info. Data integrity & confidentiality are compromised.β¦
π‘οΈ **CWE-89**: SQL Injection. π **Root Cause**: Insufficient escaping of user-supplied parameters. Lack of prepared statements in SQL queries. Improper neutralization of special elements.
Q3Who is affected? (Versions/Components)
π¦ **Vendor**: ComMotion. π **Affected**: 'Course Booking System' plugin. π **Versions**: 6.0.5 and earlier. (Note: Some sources cite up to 6.0.6). π **Platform**: WordPress sites using this specific plugin.
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Attacker Action**: Append malicious SQL queries. π **Data Access**: Extract sensitive data from the database (users, credentials, config). π **Privileges**: Unauthenticated access required.β¦
β‘ **Threshold**: LOW. π **Auth**: None required (Unauthenticated). π±οΈ **UI**: No user interaction needed. π **Network**: Remote exploitation possible (AV:N). Easy to exploit.
Q6Is there a public Exp? (PoC/Wild Exploitation)
β **Yes, Public Exploits Exist**. π **PoC**: Available on GitHub (RandomRobbieBF). π **Scanner**: Nuclei templates available (projectdiscovery). π₯ **Status**: Active exploitation potential is high due to easy access.
π§ **Fix**: Update plugin to latest version. π’ **Official**: Patch available from vendor/WordPress repo. β οΈ **Note**: Ensure version is strictly greater than 6.0.5/6.0.6. π **Action**: Immediate update recommended.
Q9What if no patch? (Workaround)
π« **No Patch?**: Disable the plugin immediately. π‘οΈ **WAF**: Deploy Web Application Firewall rules to block SQLi patterns. π **Access Control**: Restrict access to plugin endpoints if possible. π **Risk**: High risk untiβ¦
π₯ **Priority**: CRITICAL. β±οΈ **Urgency**: HIGH. π **CVSS**: High severity (C:H, S:C). π **Action**: Patch NOW. Unauthenticated access makes this an immediate threat to any affected WordPress site.