First published: Fri Jun 09 2023(Updated: )
The Multiple Page Generator Plugin for WordPress is vulnerable to time-based SQL Injection via the orderby and order parameters in versions up to, and including, 3.3.17 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Themeisle Multiple Page Generator Plugin - MPG | <=3.3.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2607 refers to a vulnerability in the Multiple Page Generator Plugin for WordPress that allows for time-based SQL injection.
CVE-2023-2607 has a severity rating of 7.2 (high).
Versions up to and including 3.3.17 of the Multiple Page Generator Plugin for WordPress are affected by CVE-2023-2607.
CVE-2023-2607 works by exploiting insufficient escaping on the user-supplied parameters 'orderby' and 'order', leading to time-based SQL injection.
To fix CVE-2023-2607, it is recommended to update the Multiple Page Generator Plugin for WordPress to a version beyond 3.3.17.