CVE-2023-6373

8.8 HIGH

📋 TL;DR

The ArtPlacer Widget WordPress plugin before version 2.20.7 contains a SQL injection vulnerability in the 'id' parameter that is not properly sanitized. This allows authenticated users with editor privileges or higher to execute arbitrary SQL queries on the database. The vulnerability is compounded by a lack of CSRF protection, enabling cross-site request forgery attacks against logged-in editors.

💻 Affected Systems

Products:
  • ArtPlacer Widget WordPress Plugin
Versions: All versions before 2.20.7
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. Attackers need editor-level access or above to exploit directly.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary SQL commands, potentially leading to complete database compromise, data theft, privilege escalation, or remote code execution via database functions.

🟠

Likely Case

Authenticated attackers with editor access could extract sensitive data from the WordPress database, modify content, or create administrative accounts.

🟢

If Mitigated

With proper access controls and input validation, the attack surface is limited to authorized users only, reducing the risk of widespread compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access (editor or higher) but is straightforward due to lack of input sanitization. CSRF vulnerability enables attacks without direct authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.20.7

Vendor Advisory: https://wpscan.com/vulnerability/afc11c92-a7c5-4e55-8f34-f2235438bd1b/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'ArtPlacer Widget' and check if update is available. 4. Click 'Update Now' to upgrade to version 2.20.7 or higher. 5. Verify the plugin version after update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the ArtPlacer Widget plugin until patched

wp plugin deactivate artplacer-widget

Restrict user privileges

all

Limit editor and administrator accounts to trusted users only

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block SQL injection patterns
  • Apply principle of least privilege by reducing editor-level accounts to minimum necessary

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → ArtPlacer Widget version

Check Version:

wp plugin get artplacer-widget --field=version

Verify Fix Applied:

Confirm plugin version is 2.20.7 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by editor-level access
  • Unexpected plugin file modifications

Network Indicators:

  • POST requests to wp-admin/admin-ajax.php with SQL patterns in parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="wordpress.log" AND ("artplacer" OR "admin-ajax.php") AND ("SELECT", "UNION", "INSERT", "DELETE")

🔗 References

📤 Share & Export