First published: Thu Feb 24 2022(Updated: )
The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the current_page_type parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP Statistics | <=13.1.5 |
Update to version 13.1.6 or newer.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0651 is considered a high severity vulnerability due to its potential for SQL Injection attacks.
To fix CVE-2022-0651, update the WP Statistics plugin to version 13.1.6 or later where the vulnerability has been patched.
The impact of CVE-2022-0651 allows unauthenticated attackers to execute arbitrary SQL queries on the affected WordPress site.
WP Statistics versions up to and including 13.1.5 are affected by CVE-2022-0651.
No, CVE-2022-0651 can be exploited by attackers without any authentication.