CVE-2017-7719

9.8 CRITICAL

📋 TL;DR

This is a critical SQL injection vulnerability in the Spider Event Calendar WordPress plugin that allows attackers to execute arbitrary SQL commands. It affects WordPress sites using vulnerable versions of this plugin, potentially compromising the entire database.

💻 Affected Systems

Products:
  • Spider Event Calendar WordPress plugin
Versions: All versions before 1.5.52
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions installed and activated

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, privilege escalation, and full site takeover

🟠

Likely Case

Database information disclosure, potential admin access, and site defacement

🟢

If Mitigated

Limited impact with proper input validation and database permissions

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing and this requires no authentication
🏢 Internal Only: MEDIUM - Internal WordPress sites could still be compromised by internal threats

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward via HTTP requests with malicious order_by parameters

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.52

Vendor Advisory: https://wordpress.org/plugins/spider-event-calendar/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Spider Event Calendar
4. Click 'Update Now' if available
5. If not, download version 1.5.52+ from WordPress repository
6. Deactivate old plugin
7. Upload and activate new version

🔧 Temporary Workarounds

Input Validation WAF Rule

all

Add web application firewall rule to block SQL injection patterns in order_by parameter

# Example ModSecurity rule:
SecRule ARGS:order_by "@detectSQLi" "id:1001,phase:2,deny,status:403,msg:'SQLi attempt in order_by parameter'"

Plugin Deactivation

linux

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate spider-event-calendar

🧯 If You Can't Patch

  • Remove the plugin entirely and use alternative calendar solutions
  • Implement strict network segmentation to isolate WordPress instance

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Spider Event Calendar version number

Check Version:

wp plugin list --name=spider-event-calendar --field=version

Verify Fix Applied:

Confirm plugin version is 1.5.52 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in WordPress logs
  • HTTP requests with order_by parameter containing SQL keywords
  • Multiple failed login attempts following suspicious requests

Network Indicators:

  • HTTP POST/GET requests to calendar_functions.php or widget_Theme_functions.php with order_by parameter
  • Unusual database connection patterns from web server

SIEM Query:

source="wordpress.log" AND "order_by" AND ("UNION" OR "SELECT" OR "INSERT" OR "DELETE")

🔗 References

📤 Share & Export