CVE-2017-7719
📋 TL;DR
This is a critical SQL injection vulnerability in the Spider Event Calendar WordPress plugin that allows attackers to execute arbitrary SQL commands. It affects WordPress sites using vulnerable versions of this plugin, potentially compromising the entire database.
💻 Affected Systems
- Spider Event Calendar WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, privilege escalation, and full site takeover
Likely Case
Database information disclosure, potential admin access, and site defacement
If Mitigated
Limited impact with proper input validation and database permissions
🎯 Exploit Status
Exploitation is straightforward via HTTP requests with malicious order_by parameters
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.5.52
Vendor Advisory: https://wordpress.org/plugins/spider-event-calendar/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Spider Event Calendar
4. Click 'Update Now' if available
5. If not, download version 1.5.52+ from WordPress repository
6. Deactivate old plugin
7. Upload and activate new version
🔧 Temporary Workarounds
Input Validation WAF Rule
allAdd web application firewall rule to block SQL injection patterns in order_by parameter
# Example ModSecurity rule:
SecRule ARGS:order_by "@detectSQLi" "id:1001,phase:2,deny,status:403,msg:'SQLi attempt in order_by parameter'"
Plugin Deactivation
linuxTemporarily disable the vulnerable plugin until patched
wp plugin deactivate spider-event-calendar
🧯 If You Can't Patch
- Remove the plugin entirely and use alternative calendar solutions
- Implement strict network segmentation to isolate WordPress instance
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Spider Event Calendar version number
Check Version:
wp plugin list --name=spider-event-calendar --field=version
Verify Fix Applied:
Confirm plugin version is 1.5.52 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in WordPress logs
- HTTP requests with order_by parameter containing SQL keywords
- Multiple failed login attempts following suspicious requests
Network Indicators:
- HTTP POST/GET requests to calendar_functions.php or widget_Theme_functions.php with order_by parameter
- Unusual database connection patterns from web server
SIEM Query:
source="wordpress.log" AND "order_by" AND ("UNION" OR "SELECT" OR "INSERT" OR "DELETE")