CVE-2025-22347

8.2 HIGH

📋 TL;DR

This vulnerability in the BSK Forms Blacklist WordPress plugin allows attackers to perform Cross-Site Request Forgery (CSRF) attacks that lead to Blind SQL Injection. Attackers can trick authenticated administrators into executing malicious SQL queries, potentially compromising the WordPress database. This affects all WordPress sites using BSK Forms Blacklist plugin versions up to 3.9.

💻 Affected Systems

Products:
  • BSK Forms Blacklist WordPress Plugin
Versions: All versions up to and including 3.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin active. Attack requires tricking authenticated admin users.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, privilege escalation, and potential full site takeover through SQL injection payloads.

🟠

Likely Case

Unauthorized data access, modification of plugin settings, and potential extraction of sensitive information from the WordPress database.

🟢

If Mitigated

Limited impact with proper CSRF protections and database permissions, though SQL injection vectors remain dangerous.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick authenticated users. CSRF to SQL injection chain increases complexity but is well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 3.9

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/bsk-gravityforms-blacklist/vulnerability/wordpress-bsk-forms-blacklist-plugin-3-9-csrf-to-sql-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find BSK Forms Blacklist. 4. Click 'Update Now' if update available. 5. If no update, deactivate and remove plugin immediately.

🔧 Temporary Workarounds

Implement CSRF Protection

WordPress

Add WordPress nonce verification to all plugin forms and AJAX requests

Requires code modification: Add wp_nonce_field() to forms and check_ajax_referer() to AJAX handlers

Input Validation and Prepared Statements

WordPress

Implement proper input validation and use WordPress $wpdb->prepare() for all database queries

Requires code modification: Replace direct SQL queries with $wpdb->prepare() statements

🧯 If You Can't Patch

  • Deactivate and remove the BSK Forms Blacklist plugin immediately
  • Implement web application firewall (WAF) rules to block SQL injection patterns and CSRF attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for BSK Forms Blacklist version 3.9 or lower

Check Version:

wp plugin list --name='BSK Forms Blacklist' --field=version

Verify Fix Applied:

Verify plugin version is higher than 3.9 or plugin is completely removed

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in WordPress debug logs
  • Multiple failed admin actions from same IP
  • Unexpected plugin setting changes

Network Indicators:

  • POST requests to wp-admin/admin-ajax.php with SQL patterns
  • Requests with suspicious parameters to plugin endpoints

SIEM Query:

source="wordpress.log" AND ("BSK Forms Blacklist" OR "admin-ajax.php") AND ("SELECT", "UNION", "INSERT", "UPDATE", "DELETE")

🔗 References

📤 Share & Export