CVE-2020-11530
📋 TL;DR
CVE-2020-11530 is a critical SQL injection vulnerability in the Chop Slider 3 WordPress plugin that allows attackers to execute arbitrary SQL queries through the id parameter in get_script/index.php. This affects all WordPress sites running vulnerable versions of the plugin, potentially compromising the entire database.
💻 Affected Systems
- WordPress Chop Slider 3 Plugin
📦 What is this software?
Chop Slider by Idangero
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including sensitive data exfiltration, privilege escalation, and full site takeover.
Likely Case
Data theft, user information leakage, and potential administrative access to the WordPress site.
If Mitigated
Limited impact with proper input validation and database user restrictions.
🎯 Exploit Status
Multiple public exploit scripts available; requires no authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 3.4
Vendor Advisory: https://idangero.us/
Restart Required: No
Instructions:
1. Update Chop Slider 3 plugin to latest version. 2. If update unavailable, remove plugin entirely. 3. Verify no vulnerable files remain.
🔧 Temporary Workarounds
Block vulnerable endpoint
allBlock access to get_script/index.php via web server configuration
# Apache: RewriteRule ^wp-content/plugins/chop-slider-3/get_script/index\.php - [F,L]
# Nginx: location ~* /wp-content/plugins/chop-slider-3/get_script/index\.php { deny all; }
Input validation via WAF
allImplement web application firewall rules to block SQL injection patterns
🧯 If You Can't Patch
- Immediately disable or remove the Chop Slider 3 plugin
- Implement strict network segmentation and monitor for SQL injection attempts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel for Chop Slider 3 plugin version ≤3.4
Check Version:
wp plugin list | grep -i chop
Verify Fix Applied:
Confirm plugin version >3.4 or plugin completely removed
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple requests to /wp-content/plugins/chop-slider-3/get_script/index.php with SQL patterns
Network Indicators:
- HTTP requests with SQL injection payloads in id parameter
- Unusual database connections from web server
SIEM Query:
source="web_logs" AND uri="/wp-content/plugins/chop-slider-3/get_script/index.php" AND (query_string="*id=*" AND (query_string="*UNION*" OR query_string="*SELECT*" OR query_string="*OR*"))
🔗 References
- http://packetstormsecurity.com/files/157607/WordPress-ChopSlider-3-SQL-Injection.html
- http://packetstormsecurity.com/files/157655/WordPress-ChopSlider3-3.4-SQL-Injection.html
- http://seclists.org/fulldisclosure/2020/May/26
- https://github.com/idangerous/Plugins/tree/master/Chop%20Slider%203
- https://idangero.us/
- http://packetstormsecurity.com/files/157607/WordPress-ChopSlider-3-SQL-Injection.html
- http://packetstormsecurity.com/files/157655/WordPress-ChopSlider3-3.4-SQL-Injection.html
- http://seclists.org/fulldisclosure/2020/May/26
- https://github.com/idangerous/Plugins/tree/master/Chop%20Slider%203
- https://idangero.us/