CVE-2015-9450
📋 TL;DR
This vulnerability allows SQL injection attacks in the Plugmatter Optin Feature Box Lite WordPress plugin. Attackers can execute arbitrary SQL commands via the pmfb_tid parameter in admin-ajax.php requests, potentially compromising WordPress sites running vulnerable versions. All WordPress installations using this plugin before version 2.0.14 are affected.
💻 Affected Systems
- Plugmatter Optin Feature Box Lite WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, privilege escalation, remote code execution, and full site takeover.
Likely Case
Database information disclosure, user credential theft, and potential site defacement.
If Mitigated
Limited impact with proper input validation and database permissions in place.
🎯 Exploit Status
SQL injection via GET parameter is straightforward to exploit with common tools like sqlmap.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.14
Vendor Advisory: https://wordpress.org/plugins/plugmatter-optin-feature-box-lite/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Plugmatter Optin Feature Box Lite'. 4. Click 'Update Now' if available, or delete and reinstall latest version. 5. Verify version is 2.0.14 or higher.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the Plugmatter Optin Feature Box Lite plugin
wp plugin deactivate plugmatter-optin-feature-box-lite
Web Application Firewall rule
allBlock requests containing suspicious SQL injection patterns targeting pmfb_tid parameter
🧯 If You Can't Patch
- Remove the plugin entirely if not essential for site functionality
- Implement strict input validation and parameterized queries at application level
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Plugmatter Optin Feature Box Lite → Version. If version < 2.0.14, vulnerable.
Check Version:
wp plugin get plugmatter-optin-feature-box-lite --field=version
Verify Fix Applied:
Confirm plugin version is 2.0.14 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in WordPress logs
- Multiple requests to /wp-admin/admin-ajax.php with pmfb_tid parameter containing SQL syntax
Network Indicators:
- HTTP GET requests to admin-ajax.php with pmfb_tid parameter containing SQL keywords (SELECT, UNION, etc.)
SIEM Query:
url:*/wp-admin/admin-ajax.php* AND (pmfb_tid:SELECT OR pmfb_tid:UNION OR pmfb_tid:INSERT OR pmfb_tid:DELETE)
🔗 References
- http://cinu.pl/research/wp-plugins/mail_ec951d52aa603c9caaca8c7005b84004.html
- https://wordpress.org/plugins/plugmatter-optin-feature-box-lite/#developers
- https://wpvulndb.com/vulnerabilities/8340
- http://cinu.pl/research/wp-plugins/mail_ec951d52aa603c9caaca8c7005b84004.html
- https://wordpress.org/plugins/plugmatter-optin-feature-box-lite/#developers
- https://wpvulndb.com/vulnerabilities/8340