CVE-2017-1002022
📋 TL;DR
This vulnerability allows SQL injection attacks in the WordPress Surveys plugin version 1.01.8. Attackers can manipulate database queries through unsanitized survey parameters, potentially compromising the WordPress site. All WordPress installations using the vulnerable plugin version are affected.
💻 Affected Systems
- WordPress Surveys plugin
📦 What is this software?
Surveys by Surveys Project
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, privilege escalation, remote code execution, or site takeover.
Likely Case
Data extraction from the WordPress database including user credentials, sensitive content, or plugin data.
If Mitigated
Limited impact with proper input validation and parameterized queries preventing SQL injection.
🎯 Exploit Status
SQL injection vulnerabilities are commonly exploited and public proof-of-concept exists.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.01.9 or later
Vendor Advisory: https://wordpress.org/plugins/surveys/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Surveys plugin and click 'Update Now'. 4. Verify plugin version is 1.01.9 or higher.
🔧 Temporary Workarounds
Disable Surveys plugin
allTemporarily deactivate the vulnerable plugin until patched
wp plugin deactivate surveys
Web Application Firewall rule
linuxBlock SQL injection patterns targeting the surveys plugin
ModSecurity rule: SecRule ARGS_GET|ARGS_POST "(?i:(union|select|insert|update|delete|drop|alter).*?from)" "id:1002022,phase:2,deny,status:403,msg:'CVE-2017-1002022 SQLi attempt'
🧯 If You Can't Patch
- Remove the Surveys plugin completely from the WordPress installation
- Implement strict input validation and parameterized queries in custom code
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Surveys plugin version. If version is 1.01.8, system is vulnerable.
Check Version:
wp plugin get surveys --field=version
Verify Fix Applied:
Verify plugin version is 1.01.9 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- SQL syntax errors in WordPress debug logs
- Unusual database queries containing UNION, SELECT, INSERT statements
- Multiple failed survey parameter requests
Network Indicators:
- HTTP requests with SQL injection payloads in survey parameters
- Unusual traffic patterns to /wp-content/plugins/surveys/
SIEM Query:
source="wordpress.log" AND ("questions.php" OR "surveys") AND ("union" OR "select" OR "insert" OR "' OR '1'='1")