First published: Thu Dec 07 2023(Updated: )
The Burst Statistics – Privacy-Friendly Analytics for WordPress plugin for WordPress is vulnerable to SQL Injection via the 'url' parameter in versions 1.4.0 to 1.4.6.1 (free) and versions 1.4.0 to 1.5.0 (pro) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP Web Statistik | >=1.4.0<1.5.0 | |
PHP Web Statistik | >=1.4.0<1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5761 is classified as a medium severity SQL injection vulnerability.
To fix CVE-2023-5761, update the Burst Statistics plugin to version 1.4.7 or later for the free version and 1.5.1 or later for the pro version.
CVE-2023-5761 affects Burst Statistics plugin versions 1.4.0 to 1.4.6.1 for the free version and 1.4.0 to 1.5.0 for the pro version.
CVE-2023-5761 exploits the SQL injection vulnerability via the 'url' parameter due to insufficient escaping.
Yes, CVE-2023-5761 can potentially allow unauthorized access to sensitive information in the database.