First published: Tue Mar 17 2015(Updated: )
Multiple SQL injection vulnerabilities in admin/class-bulk-editor-list-table.php in the WordPress SEO by Yoast plugin before 1.5.7, 1.6.x before 1.6.4, and 1.7.x before 1.7.4 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) order_by or (2) order parameter in the wpseo_bulk-editor page to wp-admin/admin.php. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yoast SEO | <=1.5.6 | |
Yoast SEO | =1.6.0 | |
Yoast SEO | =1.6.1 | |
Yoast SEO | =1.6.2 | |
Yoast SEO | =1.6.3 | |
Yoast SEO | =1.7.1 | |
Yoast SEO | =1.7.2 | |
Yoast SEO | =1.7.3 | |
Yoast SEO | =1.7.3.1 | |
Yoast SEO | =1.7.3.2 | |
Yoast SEO | =1.7.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2292 is classified as a medium severity SQL injection vulnerability that can allow remote authenticated users to execute arbitrary SQL commands.
To fix CVE-2015-2292, update the WordPress SEO by Yoast plugin to version 1.5.7 or later, or 1.6.4 or later, or 1.7.4 or later.
Users of the WordPress SEO by Yoast plugin versions prior to 1.5.7, 1.6.x before 1.6.4, and 1.7.x before 1.7.4 are affected by CVE-2015-2292.
Exploiting CVE-2015-2292 could lead to unauthorized access to the database, allowing attackers to read, modify, or delete data.
CVE-2015-2292 is vulnerable due to SQL injection in the order_by and order parameters.