CVE-2020-35012

7.2 HIGH

📋 TL;DR

This SQL injection vulnerability in the Events Manager WordPress plugin allows attackers to execute arbitrary SQL commands on affected WordPress sites. It affects all WordPress installations using vulnerable versions of the plugin, potentially compromising site data and functionality.

💻 Affected Systems

Products:
  • Events Manager WordPress Plugin
Versions: All versions before 5.9.8
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, privilege escalation, or complete site takeover.

🟠

Likely Case

Unauthorized data access, including sensitive user information, event data, and potentially administrative credentials.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only allowing data viewing without modification.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities are commonly exploited, and proof-of-concept details are publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.9.8

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2336019/events-manager

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins > Installed Plugins
3. Find Events Manager plugin
4. Click 'Update Now' if available
5. If manual update needed, download version 5.9.8+ from WordPress.org
6. Deactivate old plugin, upload new version, activate

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the Events Manager plugin until patched

wp plugin deactivate events-manager

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block SQL injection patterns
  • Restrict database user permissions to read-only where possible

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Events Manager version number

Check Version:

wp plugin get events-manager --field=version

Verify Fix Applied:

Confirm plugin version is 5.9.8 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts following SQL patterns
  • Unexpected database errors in WordPress logs

Network Indicators:

  • HTTP requests with SQL injection patterns in parameters
  • Unusual database connection patterns

SIEM Query:

source="wordpress.log" AND "events-manager" AND ("SQL" OR "database error")

🔗 References

📤 Share & Export