Skip to main content

CVE-2022-21661

Description

WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to improper sanitization in WP_Query, there can be cases where SQL injection is possible through plugins or themes that use it in a certain way. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this vulnerability.

nvd
CVE ID: CVE-2022-21661
Base Score: 7.5
Base Severity: HIGH
Vector String:CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Impact Score: 3.6
Exploitability Score: 3.9
github
CVE ID: CVE-2022-21661
Base Score: 8.0
Base Severity: HIGH
Vector String:CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Impact Score: 6.0
Exploitability Score: 1.3

Proof Of Concept

Nuclei Templates for CVE-2022-21661
TAPESH-TEAM

WordPress Core 5.8.2 - 'WP_Query' SQL Injection

Refrence: GitHub

purple-WL

Refrence: GitHub

0x4E0x650x6F

Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit

Refrence: GitHub

z92g

WordPress WP_Query SQL Injection POC

Refrence: GitHub

guestzz

CVE-2022-21661 exp for Elementor custom skin.

Refrence: GitHub

safe3s

The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' / CVE-2022-21661)

Refrence: GitHub

WellingtonEspindula

Study and exploit the vulnerability CVE-2022-21661 that allows SQL Injections through plugins POST requests to WordPress versions below 5.8.3.

Refrence: GitHub

daniel616

Demonstration of the SQL injection vulnerability in wordpress 5.8.2

Refrence: GitHub

sealldeveloper

A Python PoC of CVE-2022-21661, inspired from z92g's Go PoC

Refrence: GitHub

p4ncontomat3

Script to validate WordPress CVE-2022-21661

Refrence: GitHub

CharonDefalt

Refrence: GitHub

Refrence: NVDMITRE