CVE-2023-2607

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated WordPress administrators to perform time-based SQL injection attacks via the orderby and order parameters in the Multiple Page Generator plugin. Attackers can extract sensitive database information by appending malicious SQL queries. Only WordPress sites using vulnerable versions of this specific plugin are affected.

💻 Affected Systems

Products:
  • Multiple Page Generator Plugin for WordPress
Versions: All versions up to and including 3.3.17
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated and an authenticated administrator account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including extraction of sensitive user data, passwords, and potentially full site takeover if other vulnerabilities are chained.

🟠

Likely Case

Extraction of sensitive plugin data, user information, and potential privilege escalation within the WordPress installation.

🟢

If Mitigated

Limited impact due to administrator-only access requirement and proper input validation/sanitization.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires administrator privileges and knowledge of SQL injection techniques. Time-based attacks are slower but can bypass some detection mechanisms.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.18

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2910686%40multiple-pages-generator-by-porthas%2Ftrunk&old=2905353%40multiple-pages-generator-by-porthas%2Ftrunk&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Multiple Page Generator' plugin. 4. Click 'Update Now' if available, or download version 3.3.18+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Multiple Page Generator plugin until patched

wp plugin deactivate multiple-pages-generator-by-porthas

Restrict administrator access

all

Limit administrator accounts to trusted personnel only and implement strong authentication

🧯 If You Can't Patch

  • Remove administrator privileges from untrusted users
  • Implement web application firewall with SQL injection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Multiple Page Generator → Version number. If version is 3.3.17 or lower, you are vulnerable.

Check Version:

wp plugin get multiple-pages-generator-by-porthas --field=version

Verify Fix Applied:

Verify plugin version is 3.3.18 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in WordPress debug logs
  • Multiple failed login attempts followed by administrator access
  • Long-running database queries from WordPress processes

Network Indicators:

  • Unusual database traffic patterns from web server
  • Repeated requests with SQL-like parameters in orderby/order fields

SIEM Query:

source="wordpress.log" AND ("orderby" OR "order") AND ("sleep" OR "benchmark" OR "waitfor")

🔗 References

📤 Share & Export