SB2020021802 - SQL injection in Popup Builder plugin for WordPress
Published: February 18, 2020 Updated: August 28, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) SQL injection (CVE-ID: CVE-2020-9006)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in the "sgImportPopups" function in "sg_popup_ajax.php". A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
Install update from vendor's website.
References
- https://plugins.trac.wordpress.org/browser/popup-builder/tags/2.2.8/files/sg_popup_ajax.php#L69
- https://wordpress.org/plugins/popup-builder/#developers
- https://wpvulndb.com/vulnerabilities/10073
- https://zeroauth.ltd/blog/2020/02/16/cve-2020-9006-popup-builder-wp-plugin-sql-injection-via-php-deserialization/