CVE-2022-0784

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary SQL commands on WordPress sites using the Title Experiments Free plugin. Attackers can steal sensitive data, modify database content, or potentially gain administrative access. All WordPress sites with vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Title Experiments Free WordPress Plugin
Versions: All versions before 9.0.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in default plugin configuration and requires no special settings to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, site defacement, backdoor installation, and full administrative control of the WordPress installation.

🟠

Likely Case

Data exfiltration including user credentials, sensitive content, and potential privilege escalation to administrator level.

🟢

If Mitigated

Attack blocked at WAF level or plugin disabled, no impact to site functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple SQL injection via AJAX endpoint with no authentication required. Exploitation tools are widely available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.0.1

Vendor Advisory: https://wpscan.com/vulnerability/6672b59f-14bc-4a22-9e0b-fcab4e01d97f

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Title Experiments Free'. 4. Click 'Update Now' if available, or manually update to version 9.0.1+. 5. Verify plugin is active and functioning.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the Title Experiments Free plugin until patched

wp plugin deactivate title-experiments-free

WAF rule blocking

all

Block requests to the vulnerable AJAX endpoint

Block HTTP requests containing 'wpex_titles' in URL or parameters

🧯 If You Can't Patch

  • Disable the Title Experiments Free plugin immediately
  • Implement web application firewall rules to block SQL injection patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Title Experiments Free version number

Check Version:

wp plugin get title-experiments-free --field=version

Verify Fix Applied:

Confirm plugin version is 9.0.1 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-admin/admin-ajax.php with action=wpex_titles containing SQL syntax
  • Unusual database queries from web server process
  • Multiple failed SQL queries from same IP

Network Indicators:

  • POST requests to admin-ajax.php with SQL injection payloads in parameters
  • Unusual traffic patterns to AJAX endpoints

SIEM Query:

source="web_logs" AND url="*admin-ajax.php*" AND (param="*wpex_titles*" OR payload="*UNION*" OR payload="*SELECT*" OR payload="*FROM*" OR payload="*WHERE*")

🔗 References

📤 Share & Export