First published: Wed Nov 24 2021(Updated: )
The SQL injection vulnerability in the Hide My WP WordPress plugin (versions <= 6.2.3) is possible because of how the IP address is retrieved and used inside a SQL query. The function "hmwp_get_user_ip" tries to retrieve the IP address from multiple headers, including IP address headers that the user can spoof, such as "X-Forwarded-For." As a result, the malicious payload supplied in one of these IP address headers will be directly inserted into the SQL query, making SQL injection possible.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hide My WP | <=6.2.3 |
Update to 6.2.4 or higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36916 has been assigned a moderate severity rating due to the potential for SQL injection leading to unauthorized data access.
To fix CVE-2021-36916, update the Hide My WP WordPress plugin to version 6.2.4 or later.
CVE-2021-36916 affects Hide My WP plugin versions 6.2.3 and earlier.
Not addressing CVE-2021-36916 could allow attackers to execute arbitrary SQL queries, potentially compromising sensitive information.
To prevent SQL injection vulnerabilities like CVE-2021-36916, always sanitize and validate user inputs before using them in SQL queries.