S4E Mobile Logo

CVE-2023-3197 Scanner

CVE-2023-3197 Scanner - SQL Injection (SQLi) vulnerability in WordPress MStore API

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

12 days 23 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

The MStore API is a plugin designed for WordPress, primarily used by developers who create mobile apps from their WordPress-powered websites. It serves as a bridge between WordPress sites and mobile applications, allowing for seamless data exchange and interaction. This plugin is employed in diverse industries, from e-commerce to content management systems, providing flexibility in creating tailored mobile solutions. It facilitates users in integrating their content, product listings, and user data to mobile platforms. Given its capabilities, MStore API is crucial for those seeking to enhance their web presence with mobile applications. The widespread utilization of this plugin highlights its importance in modern website management and development.

SQL Injection (SQLi) is a critical vulnerability that permits attackers to interfere with the queries a web application makes to its database. In the case of the MStore API, the vulnerability arises from improper sanitization, allowing attackers to exploit it via the 'id' parameter. This could enable malicious actors to execute arbitrary SQL commands, potentially compromising the entire database. Such exploits can uncover sensitive information, allowing for unauthorized access or data manipulation. SQL Injection attacks are notoriously dangerous, often leading to severe data breaches. Addressing this threat is crucial to maintain the integrity and confidentiality of database systems exposed to web interactions.

The SQL Injection vulnerability in WordPress MStore API is triggered by insufficient escaping of the 'id' parameter in SQL queries. When an attacker sends a specially crafted request with a malicious 'id' value, they can manipulate the database query to execute arbitrary commands. The endpoint '/wp-json/api/flutter_multi_vendor/product-categories' becomes particularly susceptible when accessed with the query '?id=1 AND (SELECT 1 FROM (SELECT SLEEP(6))a),' resulting in a time delay that confirms the presence of the flaw. Successful exploitation allows the adversary to perform operations on the database, extracting critical information without authentication. The vulnerability is particularly risky due to the lack of user authentication required to exploit it.

When exploited, the SQL Injection vulnerability in the WordPress MStore API can lead to significant damage. Attackers can extract sensitive information ranging from user details to configuration settings stored within the database. The exposure of such data can result in extensive privacy violations, including data leaks and unauthorized access to backend systems. Additionally, attackers could modify or delete crucial data, impacting website integrity and performance. The exploitation potentially leads to administrative control being usurped by malicious parties, threatening the overall security of the website. These severe impacts underscore the importance of promptly addressing SQL Injection vulnerabilities.

REFERENCES

Get started to protecting your digital assets