CVE-2022-0592

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in the MapSVG WordPress plugin allows unauthenticated attackers to execute arbitrary SQL commands on affected WordPress sites. Attackers can potentially read, modify, or delete database content, including sensitive user data. All WordPress sites running MapSVG plugin versions before 6.2.20 are affected.

💻 Affected Systems

Products:
  • MapSVG WordPress Plugin
Versions: All versions before 6.2.20
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable MapSVG plugin versions, regardless of WordPress version or configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, privilege escalation, and potential remote code execution via database functions.

🟠

Likely Case

Data exfiltration of sensitive information (user credentials, personal data), database manipulation, and potential site defacement.

🟢

If Mitigated

Limited impact with proper input validation and database user privilege restrictions, though SQL injection could still expose some data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via REST endpoint requires minimal technical skill to exploit. Public exploit details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.2.20 and later

Vendor Advisory: https://wpscan.com/vulnerability/5d8d53ad-dc88-4b50-a292-fc447484c27b

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find MapSVG plugin and check version. 4. If below 6.2.20, update to latest version. 5. Verify update completed successfully.

🔧 Temporary Workarounds

Disable MapSVG Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate mapsvg-lite
wp plugin deactivate mapsvg

Restrict REST API Access

linux

Block access to the vulnerable REST endpoint via web server configuration.

# Apache: Add to .htaccess
RewriteRule ^wp-json/mapsvg/.*$ - [F,L]
# Nginx: Add to server block
location ~ ^/wp-json/mapsvg/ { deny all; }

🧯 If You Can't Patch

  • Disable the MapSVG plugin immediately.
  • Implement web application firewall (WAF) rules to block SQL injection patterns targeting the vulnerable endpoint.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → MapSVG version. If version is below 6.2.20, system is vulnerable.

Check Version:

wp plugin list --name=mapsvg --field=version

Verify Fix Applied:

Verify MapSVG plugin version is 6.2.20 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in WordPress logs
  • Multiple requests to /wp-json/mapsvg/ endpoints with SQL-like parameters
  • Database connection errors or unusual query patterns

Network Indicators:

  • HTTP POST/GET requests to /wp-json/mapsvg/* containing SQL keywords (UNION, SELECT, INSERT, etc.)
  • Unusual traffic patterns to WordPress REST API endpoints

SIEM Query:

source="wordpress.log" AND ("wp-json/mapsvg" AND ("UNION" OR "SELECT" OR "INSERT" OR "DELETE" OR "DROP"))

🔗 References

📤 Share & Export