{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-25148","assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","assignerShortName":"Wordfence","dateUpdated":"2024-08-03T04:29:01.616Z","dateReserved":"2022-02-14T00:00:00.000Z","datePublished":"2022-02-24T00:00:00.000Z"},"containers":{"cna":{"title":"WP Statistics <= 13.1.5 Unauthenticated Blind SQL Injection via current_page_id","providerMetadata":{"orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence","dateUpdated":"2023-09-05T16:06:28.213Z"},"descriptions":[{"lang":"en","value":"The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the current_page_id parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5."}],"affected":[{"vendor":"WP Statistics","product":"WP Statistics","versions":[{"version":"13.1.5","status":"affected","lessThanOrEqual":"13.1.5","versionType":"custom"}]}],"references":[{"url":"https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042"},{"url":"https://www.wordfence.com/vulnerability-advisories/#CVE-2022-25148"},{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2679983%40wp-statistics&new=2679983%40wp-statistics&sfp_email=&sfph_mail="},{"url":"http://packetstormsecurity.com/files/174482/WordPress-WP-Statistics-13.1.5-SQL-Injection.html"}],"credits":[{"lang":"en","value":"Muhammad Zeeshan (Xib3rR4dAr)"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-89 SQL Injection","cweId":"CWE-89"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"EXTERNAL"},"solutions":[{"lang":"en","value":"Update to version 13.1.6 or newer."}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T04:29:01.616Z"},"title":"CVE Program Container","references":[{"url":"https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042","tags":["x_transferred"]},{"url":"https://www.wordfence.com/vulnerability-advisories/#CVE-2022-25148","tags":["x_transferred"]},{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2679983%40wp-statistics&new=2679983%40wp-statistics&sfp_email=&sfph_mail=","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/174482/WordPress-WP-Statistics-13.1.5-SQL-Injection.html","tags":["x_transferred"]}]}]}}