CVE-2021-24151
📋 TL;DR
This vulnerability allows authenticated WordPress administrators to perform blind SQL injection attacks through unsanitized plugin settings fields. Attackers with admin access can extract database information, potentially compromising the entire WordPress installation and underlying server.
💻 Affected Systems
- WP Editor WordPress Plugin
📦 What is this software?
Wp Editor by Benjaminrojas
⚠️ Risk & Real-World Impact
Worst Case
Full database compromise leading to data theft, privilege escalation, and potential remote code execution on the server.
Likely Case
Database information disclosure, including user credentials, sensitive content, and configuration data.
If Mitigated
Limited impact with proper access controls and database segmentation.
🎯 Exploit Status
Exploitation requires admin access but is straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.2.7
Vendor Advisory: https://wpscan.com/vulnerability/5ee77dd7-5a73-4d4e-8038-23e6e763e20c/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find WP Editor plugin. 4. Update to version 1.2.7 or later. 5. Verify update completed successfully.
🔧 Temporary Workarounds
Disable WP Editor Plugin
allTemporarily disable the vulnerable plugin until patching is possible.
wp plugin deactivate wp-editor
🧯 If You Can't Patch
- Restrict admin access to trusted users only.
- Implement web application firewall with SQL injection rules.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > WP Editor version number.
Check Version:
wp plugin list --name=wp-editor --field=version
Verify Fix Applied:
Confirm WP Editor plugin version is 1.2.7 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple POST requests to /wp-admin/admin.php with plugin settings parameters
Network Indicators:
- POST requests containing SQL injection patterns to plugin endpoints
SIEM Query:
source="web_logs" AND (uri="/wp-admin/admin.php" AND params CONTAINS "wp_editor") AND (params CONTAINS "SELECT" OR params CONTAINS "UNION" OR params CONTAINS "OR 1=1")