CVE-2022-1800
📋 TL;DR
This SQL injection vulnerability in the Export any WordPress data to XML/CSV plugin allows attackers to execute arbitrary SQL commands on WordPress databases. WordPress sites using vulnerable plugin versions are affected, potentially exposing sensitive data like user credentials, posts, and configuration.
💻 Affected Systems
- Export any WordPress data to XML/CSV WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, privilege escalation, site defacement, or full administrative control of the WordPress installation.
Likely Case
Extraction of sensitive data including user credentials, private posts, plugin configurations, and potentially database credentials if stored insecurely.
If Mitigated
Limited data exposure if database permissions are properly restricted and input validation exists at other layers.
🎯 Exploit Status
Exploitation requires contributor-level access or higher to access export functionality. SQL injection is well-understood with many available tools.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.3.5
Vendor Advisory: https://wordpress.org/plugins/export-any-wordpress-data-to-xmlcsv/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Export any WordPress data to XML/CSV'. 4. Click 'Update Now' if available, or download version 1.3.5+ from WordPress repository. 5. Activate the updated plugin.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the Export any WordPress data to XML/CSV plugin until patched
wp plugin deactivate export-any-wordpress-data-to-xmlcsv
Web Application Firewall rule
linuxBlock SQL injection patterns in the cpt parameter
ModSecurity rule: SecRule ARGS_POST:cpt "@detectSQLi" "id:1001,phase:2,deny,status:403"
🧯 If You Can't Patch
- Remove plugin entirely if not needed for business operations
- Implement strict network access controls to limit who can access WordPress admin interface
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Export any WordPress data to XML/CSV → Version. If version is below 1.3.5, vulnerable.
Check Version:
wp plugin get export-any-wordpress-data-to-xmlcsv --field=version
Verify Fix Applied:
Confirm plugin version is 1.3.5 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- POST requests to /wp-admin/admin-ajax.php with 'action=export_any_wp_data_to_xml_csv' containing unusual cpt parameter values
- Database error logs showing SQL syntax errors from WordPress queries
Network Indicators:
- HTTP POST requests with SQL injection patterns in cpt parameter
- Unusual database query patterns from WordPress application
SIEM Query:
source="wordpress.log" AND "export_any_wp_data_to_xml_csv" AND (cpt CONTAINS "'" OR cpt CONTAINS "--" OR cpt CONTAINS ";")