CVE-2022-0747

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary SQL commands on WordPress sites using the Infographic Maker plugin before version 4.3.8. Attackers can steal sensitive data, modify database contents, or potentially gain administrative access. Any WordPress site with the vulnerable plugin version is affected.

💻 Affected Systems

Products:
  • Infographic Maker WordPress Plugin
Versions: All versions before 4.3.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in default plugin configuration and affects both authenticated and unauthenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, site defacement, backdoor installation, and full administrative control of the WordPress installation.

🟠

Likely Case

Data exfiltration including user credentials, sensitive content, and potential privilege escalation to administrator accounts.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and web application firewall rules blocking SQL injection patterns.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via qcld_upvote_action AJAX endpoint with post_id parameter. Exploitation requires minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.3.8

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2684336

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Infographic Maker plugin. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 4.3.8+ from WordPress repository.

🔧 Temporary Workarounds

Disable vulnerable AJAX endpoint

linux

Block access to the qcld_upvote_action endpoint via .htaccess or web server configuration

# Add to .htaccess:
RewriteEngine On
RewriteCond %{QUERY_STRING} action=qcld_upvote_action [NC]
RewriteRule ^wp-admin/admin-ajax\.php$ - [F,L]

Web Application Firewall rule

all

Implement WAF rules to block SQL injection patterns targeting the post_id parameter

🧯 If You Can't Patch

  • Disable or remove the Infographic Maker plugin entirely
  • Implement strict network segmentation and limit external access to affected systems

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for Infographic Maker version. If version is below 4.3.8, system is vulnerable.

Check Version:

wp plugin list --name='infographic-maker' --field=version

Verify Fix Applied:

Confirm plugin version is 4.3.8 or higher in WordPress admin panel. Test AJAX endpoint with SQL injection payloads to verify blocking.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in WordPress logs
  • Multiple POST requests to /wp-admin/admin-ajax.php with action=qcld_upvote_action
  • Suspicious post_id parameter values containing SQL keywords

Network Indicators:

  • HTTP POST requests to admin-ajax.php with SQL injection payloads in parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="wordpress.log" AND ("qcld_upvote_action" OR "post_id" AND ("UNION" OR "SELECT" OR "INSERT" OR "DELETE"))

🔗 References

📤 Share & Export