CVE-2022-45805

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in the Paytm Payment Gateway WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It affects all WordPress sites using Paytm Payment Gateway plugin versions up to 2.7.3. Successful exploitation could lead to data theft, modification, or complete system compromise.

💻 Affected Systems

Products:
  • Paytm Payment Gateway WordPress Plugin
Versions: All versions up to and including 2.7.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Paytm Payment Gateway plugin enabled. Authentication is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to theft of sensitive payment data, user credentials, and full administrative control of the WordPress site.

🟠

Likely Case

Data exfiltration including user information, payment details, and potential privilege escalation to gain administrative access.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing SQL injection.

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing and this vulnerability requires authentication but is easily exploitable.
🏢 Internal Only: MEDIUM - Internal systems using the plugin could be compromised through authenticated internal users.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but SQL injection payloads are well-documented and easy to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.4 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/paytm-payments/wordpress-paytm-payment-gateway-plugin-2-7-3-auth-sql-injection-sqli-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Paytm Payment Gateway. 4. Click 'Update Now' if update available. 5. If no update available, download version 2.7.4+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Paytm Payment Gateway plugin until patched

wp plugin deactivate paytm-payments

Web Application Firewall Rules

all

Implement WAF rules to block SQL injection patterns targeting Paytm endpoints

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in custom code
  • Restrict database user permissions to minimum required for plugin functionality

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Paytm Payment Gateway → Version. If version is 2.7.3 or lower, you are vulnerable.

Check Version:

wp plugin list --name=paytm-payments --field=version

Verify Fix Applied:

Verify plugin version is 2.7.4 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed authentication attempts followed by SQL-like payloads in web server logs
  • Unexpected database schema changes

Network Indicators:

  • HTTP POST requests containing SQL keywords (SELECT, UNION, DROP, etc.) to Paytm plugin endpoints
  • Unusual outbound database connections

SIEM Query:

source="web_server" AND (uri_path="*paytm*" OR user_agent="*paytm*") AND (http_method="POST" OR http_method="GET") AND (request_body="*SELECT*" OR request_body="*UNION*" OR request_body="*DROP*")

🔗 References

📤 Share & Export