CVE-2023-41507
📋 TL;DR
Super Store Finder v3.6 contains SQL injection vulnerabilities in its store locator component that allow attackers to execute arbitrary SQL commands via the products, distance, lat, and lng parameters. This affects all websites running the vulnerable version of the plugin. Attackers can potentially read, modify, or delete database content.
💻 Affected Systems
- Super Store Finder
📦 What is this software?
Super Store Finder by Superstorefinder
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data destruction, or full system takeover via SQL injection to RCE chaining.
Likely Case
Database information disclosure, data manipulation, or authentication bypass leading to unauthorized access.
If Mitigated
Limited impact with proper input validation and parameterized queries preventing SQL injection.
🎯 Exploit Status
SQL injection via multiple parameters makes exploitation straightforward. Public proof-of-concept code is available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor patch notes for specific version
Vendor Advisory: https://superstorefinder.net/support/forums/topic/super-store-finder-patch-notes/
Restart Required: No
Instructions:
1. Update Super Store Finder plugin to latest patched version. 2. Verify update in WordPress admin panel. 3. Test store locator functionality.
🔧 Temporary Workarounds
Input Validation Filter
allAdd server-side validation to sanitize products, distance, lat, and lng parameters
Implement parameterized queries or prepared statements in PHP code
WAF Rule
allDeploy web application firewall rules to block SQL injection patterns
Configure WAF to detect and block SQL injection attempts on affected parameters
🧯 If You Can't Patch
- Disable or remove the Super Store Finder plugin temporarily
- Implement strict input validation and output encoding at application layer
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel for Super Store Finder plugin version. If version is 3.6 or earlier, assume vulnerable.
Check Version:
Check WordPress admin > Plugins > Super Store Finder version
Verify Fix Applied:
Update plugin and test store locator functionality with SQL injection test payloads to confirm protection.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed parameter validation attempts
- Suspicious patterns in web server access logs (SQL keywords in parameters)
Network Indicators:
- SQL injection payloads in HTTP requests to store locator endpoints
- Unusual database connection patterns
SIEM Query:
Search web logs for patterns like: products=*SQL* OR distance=*SQL* OR lat=*SQL* OR lng=*SQL*