CVE-2023-38382

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in the WordPress Subscribe to Category plugin allows attackers to execute arbitrary SQL commands on the database. It affects all WordPress sites using the plugin from any version up to 2.7.4. Successful exploitation could lead to data theft, modification, or complete database compromise.

💻 Affected Systems

Products:
  • WordPress Subscribe to Category plugin
Versions: n/a through 2.7.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations using vulnerable plugin versions regardless of OS or configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive data exfiltration, privilege escalation, and potential remote code execution via database functions.

🟠

Likely Case

Data theft of user information, plugin settings, and potentially WordPress user credentials if stored insecurely.

🟢

If Mitigated

Limited impact with proper input validation and database user privilege restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized and this has public proof-of-concept available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.5 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/subscribe-to-category/wordpress-subscribe-to-category-plugin-2-7-4-sql-injection-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins > Installed Plugins
3. Find 'Subscribe to Category' plugin
4. Click 'Update Now' if update available
5. Alternatively, download version 2.7.5+ from WordPress repository and replace plugin files

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate subscribe-to-category

Web Application Firewall

all

Implement WAF rules to block SQL injection patterns

🧯 If You Can't Patch

  • Disable the Subscribe to Category plugin immediately
  • Implement strict input validation and parameterized queries at application level

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Subscribe to Category version

Check Version:

wp plugin get subscribe-to-category --field=version

Verify Fix Applied:

Verify plugin version is 2.7.5 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts from single IP
  • Unexpected database errors in WordPress logs

Network Indicators:

  • SQL syntax in HTTP parameters
  • Unusual POST requests to plugin endpoints

SIEM Query:

source="wordpress.log" AND "subscribe-to-category" AND ("SQL" OR "database error")

🔗 References

📤 Share & Export