CVE-2022-0349

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform blind SQL injection attacks on WordPress sites running NotificationX plugin versions before 2.3.9. Attackers can extract sensitive database information, modify data, or potentially gain administrative access to affected websites. All WordPress installations with vulnerable NotificationX versions are affected.

💻 Affected Systems

Products:
  • NotificationX WordPress Plugin
Versions: All versions before 2.3.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with NotificationX plugin enabled, regardless of WordPress version or operating system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, privilege escalation to WordPress administrator, and potential server takeover if database permissions allow.

🟠

Likely Case

Extraction of sensitive data including user credentials, personal information, and plugin/theme secrets stored in the database.

🟢

If Mitigated

Limited information disclosure if database permissions are restricted and web application firewall blocks SQL injection patterns.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation makes all internet-facing WordPress sites with vulnerable plugin immediately at risk.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but attack surface is reduced compared to internet-facing systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple SQL injection via nx_id parameter requires no authentication. Public proof-of-concept exists and can be easily weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.9

Vendor Advisory: https://wpscan.com/vulnerability/1d0dd7be-29f3-4043-a9c6-67d02746463a

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find NotificationX and click 'Update Now'. 4. Verify version shows 2.3.9 or higher.

🔧 Temporary Workarounds

Disable NotificationX Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate notificationx

Web Application Firewall Rule

all

Block requests containing SQL injection patterns targeting nx_id parameter.

Modify WAF rules to block: *nx_id* AND (*SELECT* OR *UNION* OR *SLEEP* OR *BENCHMARK*)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable WordPress instances
  • Deploy web application firewall with SQL injection detection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → NotificationX version. If version is below 2.3.9, system is vulnerable.

Check Version:

wp plugin get notificationx --field=version

Verify Fix Applied:

Verify NotificationX plugin version shows 2.3.9 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing 'nx_id' parameter with SQL injection patterns
  • Unusual database query errors in WordPress logs
  • Multiple failed login attempts following SQL injection attempts

Network Indicators:

  • HTTP POST/GET requests with nx_id parameter containing SQL keywords
  • Unusual outbound database connections from web server

SIEM Query:

source="web_logs" AND (uri="*nx_id*" AND (uri="*SELECT*" OR uri="*UNION*" OR uri="*SLEEP*" OR uri="*BENCHMARK*"))

🔗 References

📤 Share & Export