CVE-2013-1400
📋 TL;DR
This vulnerability allows attackers to execute arbitrary SQL commands through SQL injection in the WordPress Poll Plugin. Attackers can manipulate pollid or poll_id parameters to potentially access, modify, or delete database content. WordPress sites using the vulnerable plugin version are affected.
💻 Affected Systems
- WordPress Poll Plugin
📦 What is this software?
Wordpress Poll by Cardozatechnologies
Wordpress Poll by Cardozatechnologies
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, site defacement, or full system takeover via SQL injection to RCE chaining
Likely Case
Database information disclosure, user data exposure, and potential privilege escalation
If Mitigated
Limited impact with proper input validation and database permissions restricting damage to poll-related tables
🎯 Exploit Status
SQL injection vulnerabilities in WordPress plugins are commonly exploited, and public details exist
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 34.5
Vendor Advisory: https://wordpress.org/plugins/wp-polls/
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'WP-Polls' plugin
4. Click 'Update Now' if update available
5. If no update available, deactivate and delete plugin
6. Install latest version from WordPress repository
🔧 Temporary Workarounds
Disable vulnerable plugin
allDeactivate the WordPress Poll Plugin to remove attack surface
wp plugin deactivate wp-polls
Web Application Firewall rule
allBlock requests containing suspicious pollid/poll_id parameters
🧯 If You Can't Patch
- Implement strict input validation for pollid and poll_id parameters
- Apply database-level controls to limit plugin database user permissions
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Installed Plugins for 'WP-Polls' version 34.5
Check Version:
wp plugin list --name=wp-polls --field=version
Verify Fix Applied:
Verify plugin version is greater than 34.5 in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- SQL error messages in WordPress logs
- Unusual database queries from web server process
- Multiple failed parameter validation attempts
Network Indicators:
- HTTP requests with SQL injection patterns in pollid/poll_id parameters
- Unusual database connection patterns from web server
SIEM Query:
web_requests WHERE url CONTAINS 'pollid' OR url CONTAINS 'poll_id' AND (url CONTAINS 'UNION' OR url CONTAINS 'SELECT' OR url CONTAINS 'OR 1=1')