CVE-2023-35915

7.6 HIGH

📋 TL;DR

This SQL injection vulnerability in WooPayments allows attackers to execute arbitrary SQL commands on WordPress sites using vulnerable versions. It affects all WordPress installations with WooPayments plugin versions up to 5.9.0. Successful exploitation could lead to data theft, modification, or deletion.

💻 Affected Systems

Products:
  • WooPayments – Fully Integrated Solution Built and Supported by Woo
Versions: All versions up to and including 5.9.0
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress sites with WooPayments plugin installed. No specific OS requirements.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive payment data, user information, and administrative takeover of the WordPress site.

🟠

Likely Case

Data exfiltration of customer information, payment details, and potential privilege escalation within the WordPress environment.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented, with database permissions restricted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly exploited. While no public PoC is confirmed, exploitation is straightforward for attackers familiar with SQL injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.9.1 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/woocommerce-payments/wordpress-woocommerce-payments-plugin-5-9-0-sql-injection-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WooPayments plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable WooPayments plugin until patched to prevent exploitation

wp plugin deactivate woocommerce-payments

Web Application Firewall Rules

all

Implement WAF rules to block SQL injection patterns targeting WooPayments endpoints

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in custom code
  • Restrict database user permissions to minimum required operations

🔍 How to Verify

Check if Vulnerable:

Check WooPayments plugin version in WordPress admin panel under Plugins → Installed Plugins

Check Version:

wp plugin get woocommerce-payments --field=version

Verify Fix Applied:

Confirm WooPayments plugin version is 5.9.1 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts or SQL errors in WordPress logs
  • Unexpected database connections from web server

Network Indicators:

  • HTTP requests with SQL injection patterns to WooPayments endpoints
  • Unusual outbound database connections from web server

SIEM Query:

source="wordpress.log" AND ("SQL syntax" OR "database error" OR "woocommerce-payments")

🔗 References

📤 Share & Export