CVE-2017-1002027

9.8 CRITICAL

📋 TL;DR

This is an SQL injection vulnerability in the RK Responsive Contact Form WordPress plugin version 1.0. Attackers can exploit unsanitized user input to execute arbitrary SQL commands on the database. All WordPress sites using this vulnerable plugin version are affected.

💻 Affected Systems

Products:
  • RK Responsive Contact Form WordPress Plugin
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with this specific plugin version installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, modification, or deletion, potentially leading to full site takeover through privilege escalation.

🟠

Likely Case

Attackers extract sensitive data from the WordPress database including user credentials, personal information, and site content.

🟢

If Mitigated

Limited impact with proper input validation and database permission restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly exploited with automated tools. The vulnerability is in a publicly accessible file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://wordpress.org/plugins/rk-responsive-contact-form/

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'RK Responsive Contact Form'
4. Click 'Deactivate' then 'Delete'
5. Remove the plugin completely as no patched version exists

🔧 Temporary Workarounds

Manual Input Sanitization

all

Add input validation to the vulnerable file before the SQL query executes

Edit ./rk-responsive-contact-form/include/rk_user_list.php and sanitize $delid variable using WordPress sanitization functions like esc_sql() or prepared statements

🧯 If You Can't Patch

  • Remove or disable the RK Responsive Contact Form plugin immediately
  • Implement web application firewall (WAF) rules to block SQL injection attempts targeting this plugin

🔍 How to Verify

Check if Vulnerable:

Check WordPress plugins list for 'RK Responsive Contact Form' version 1.0

Check Version:

wp plugin list --name='rk-responsive-contact-form' --field=version

Verify Fix Applied:

Confirm plugin is completely removed from /wp-content/plugins/ directory

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple requests to rk_user_list.php with SQL injection patterns

Network Indicators:

  • HTTP requests containing SQL keywords (SELECT, UNION, etc.) targeting the vulnerable endpoint

SIEM Query:

source="web_logs" AND uri="*/rk_user_list.php*" AND (query="*SELECT*" OR query="*UNION*" OR query="*OR 1=1*")

🔗 References

📤 Share & Export