CVE-2023-50842

8.5 HIGH

📋 TL;DR

This SQL injection vulnerability in the MF Gig Calendar WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It affects all WordPress sites running MF Gig Calendar version 1.2.1 or earlier. Successful exploitation could lead to data theft, modification, or deletion.

💻 Affected Systems

Products:
  • MF Gig Calendar WordPress Plugin
Versions: n/a through 1.2.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with the vulnerable plugin version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, privilege escalation, or full site takeover.

🟠

Likely Case

Unauthorized data access, modification of calendar entries, or extraction of sensitive information from the database.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing SQL injection.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized and have low exploitation complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/mf-gig-calendar/wordpress-mf-gig-calendar-plugin-1-2-1-sql-injection-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find MF Gig Calendar and update to version 1.2.2 or later. 4. If update not available, deactivate and remove the plugin.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the MF Gig Calendar plugin to prevent exploitation.

wp plugin deactivate mf-gig-calendar

Web Application Firewall

all

Implement WAF rules to block SQL injection patterns targeting this plugin.

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in custom code
  • Restrict database user permissions to minimum required for plugin functionality

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for MF Gig Calendar version 1.2.1 or earlier.

Check Version:

wp plugin get mf-gig-calendar --field=version

Verify Fix Applied:

Verify plugin version is 1.2.2 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts from single IP
  • Unexpected database errors in WordPress logs

Network Indicators:

  • HTTP requests with SQL injection payloads to plugin endpoints
  • Unusual database connection patterns

SIEM Query:

source="wordpress.log" AND "mf-gig-calendar" AND ("SQL" OR "database error")

🔗 References

📤 Share & Export