CVE-2022-21661
Description
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to improper sanitization in WP_Query, there can be cases where SQL injection is possible through plugins or themes that use it in a certain way. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this vulnerability.
- CVSS Version 3.1
- CVSS Version 2.0
CVE ID: CVE-2022-21661
Base Score: 7.5
Base Severity: HIGH
Vector String:CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Impact Score: 3.6
Exploitability Score: 3.9
CVE ID: CVE-2022-21661
Base Score: 8.0
Base Severity: HIGH
Vector String:CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Impact Score: 6.0
Exploitability Score: 1.3
CVE ID: CVE-2022-21661
Base Score: 5.0
Base Severity: MEDIUM
Vector String:AV:N/AC:L/Au:N/C:P/I:N/A:N
Proof Of Concept
Nuclei Templates for CVE-2022-21661
Refrence: Project Discovery GitHub
TAPESH-TEAM
WordPress Core 5.8.2 - 'WP_Query' SQL Injection
Refrence: GitHub
purple-WL
Refrence: GitHub
0x4E0x650x6F
Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit
Refrence: GitHub
z92g
WordPress WP_Query SQL Injection POC
Refrence: GitHub
guestzz
CVE-2022-21661 exp for Elementor custom skin.
Refrence: GitHub
safe3s
The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' / CVE-2022-21661)
Refrence: GitHub
WellingtonEspindula
Study and exploit the vulnerability CVE-2022-21661 that allows SQL Injections through plugins POST requests to WordPress versions below 5.8.3.
Refrence: GitHub
daniel616
Demonstration of the SQL injection vulnerability in wordpress 5.8.2
Refrence: GitHub
sealldeveloper
A Python PoC of CVE-2022-21661, inspired from z92g's Go PoC
Refrence: GitHub
p4ncontomat3
Script to validate WordPress CVE-2022-21661
Refrence: GitHub
CharonDefalt
Refrence: GitHub