CVE-2021-25007

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute arbitrary SQL commands on WordPress sites using the MOLIE plugin. It affects all WordPress installations with MOLIE plugin versions up to 0.5, potentially leading to data theft or site compromise.

💻 Affected Systems

Products:
  • MOLIE WordPress plugin
Versions: Through version 0.5
Operating Systems: All, as it's a WordPress plugin
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any WordPress installation with the vulnerable plugin version enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full database compromise, including sensitive data exfiltration, privilege escalation, or complete site takeover.

🟠

Likely Case

Unauthorized access to or manipulation of database contents, such as user data or plugin settings.

🟢

If Mitigated

Limited impact if input validation or web application firewalls block malicious requests.

🌐 Internet-Facing: HIGH, as WordPress sites are typically internet-facing and the exploit is unauthenticated.
🏢 Internal Only: LOW, assuming the site is not exposed externally, but risk exists if internal users are malicious.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward due to lack of input validation, with public details available from WPScan.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 0.5 (check plugin updates for exact version)

Vendor Advisory: https://wpscan.com/vulnerability/cf907d53-cc4a-4b02-bed3-64754128112c

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find MOLIE plugin and update to the latest version. 4. If no update is available, disable or remove the plugin.

🔧 Temporary Workarounds

Disable MOLIE plugin

linux

Temporarily deactivate the plugin to prevent exploitation until a patch is applied.

wp plugin deactivate molie

Implement WAF rules

all

Use a web application firewall to block SQL injection attempts targeting the vulnerable parameter.

🧯 If You Can't Patch

  • Restrict access to the WordPress site using IP whitelisting or authentication.
  • Monitor logs for unusual SQL queries or errors related to the MOLIE plugin.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins; if MOLIE is version 0.5 or earlier, it is vulnerable.

Check Version:

wp plugin get molie --field=version

Verify Fix Applied:

After updating, confirm the MOLIE plugin version is above 0.5 in the WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in WordPress or web server logs, especially involving 'molie' or post parameters.

Network Indicators:

  • HTTP requests with SQL injection payloads targeting endpoints related to the MOLIE plugin.

SIEM Query:

source="wordpress.log" AND "SQL" AND "molie"

🔗 References

📤 Share & Export