CVE-2023-5761

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in the Burst Statistics WordPress plugin allows unauthenticated attackers to inject malicious SQL queries via the 'url' parameter. Attackers can extract sensitive information from the database, including user credentials, personal data, and other confidential information stored in WordPress. All WordPress sites using vulnerable versions of the Burst Statistics plugin are affected.

💻 Affected Systems

Products:
  • Burst Statistics - Privacy-Friendly Analytics for WordPress
Versions: Free: 1.4.0 to 1.4.6.1, Pro: 1.4.0 to 1.5.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, privilege escalation, site takeover, and potential lateral movement to other systems.

🟠

Likely Case

Extraction of sensitive data including user credentials, personal information, and potentially administrative access to the WordPress site.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database user privilege restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via URL parameter is straightforward to exploit with common SQL injection tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Free: 1.4.6.2+, Pro: 1.5.1+

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2976467%40burst-statistics&new=2976467%40burst-statistics&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Burst Statistics plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the Burst Statistics plugin until patched

wp plugin deactivate burst-statistics

Web Application Firewall rule

all

Block SQL injection patterns targeting the 'url' parameter

🧯 If You Can't Patch

  • Implement strict input validation for all URL parameters
  • Deploy web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin panel under Plugins > Installed Plugins

Check Version:

wp plugin list --name=burst-statistics --field=version

Verify Fix Applied:

Verify plugin version is Free 1.4.6.2+ or Pro 1.5.1+

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple requests with SQL-like patterns in URL parameters
  • Failed SQL syntax errors in application logs

Network Indicators:

  • HTTP requests with SQL injection payloads in URL parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND (url="*UNION*" OR url="*SELECT*" OR url="*INSERT*" OR url="*DELETE*" OR url="*UPDATE*")

🔗 References

📤 Share & Export