WordPress Blind SQL Injection

OWASP 2013-A1 OWASP 2017-A1 OWASP 2021-A3 PCI v3.2-6.5.1 OWASP PC-C3 CAPEC-88 CWE-89 ISO27001-A.14.2.5 WASC-19 WSTG-INPV-05

WordPress is a free and open source content management. The application is built around PHP and MySQL. The main feature of WordPress includes a template system and plugin architecture. The primary users of WordPress include blogging, basic mailing list, forums, online store and many more. More than 60 million websites are using WordPress. WordPress is also used in other fields like PDS(Pervasive Display System).

The WordPress plugin is used to add features into the WordPress site. The plugins are available at https://wordpress.com/plugins. The main difference between a WordPress plugin and a WordPress theme is that the plugin controls the behaviour and features of WordPress, while themes control the presentation. A vulnerable plugin can compromise the application to attacks like XSS, SQL injection and many more. Plugins like buddyboss-media, nlinks and many more are vulnerable to attacks like stored XSS, authenticated SQL injection and many more.


The impact include:-

  • Many WordPress versions are vulnerable to SQL injection. An attacker can read, write and modify any data/tables from the database. The attacker can also execute commands on the underlying operating system.
  • The WordPress vulnerabilities can be exploited to extract sensitive information from the server. At worst case, an attacker might get access to application’s source code.
  • The attacker might get complete access and control of the web application.
  • The vulnerability might cause attacks like web cache poisoning, cross-user defacement and many more.

Mitigation / Precaution

Latest Articles