SRS Simple Hits Counter Plugin for WordPress SQL Injection

high Web Application Scanning Plugin ID 112525

Language:

Synopsis

SRS Simple Hits Counter Plugin for WordPress SQL Injection

Description

The WordPress SRS Simple Hits Counter Plugin installed on the remote host is affected by a SQL injection vulnerability.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Remove SRS Simple Hits Counter Plugin for WordPress.

See Also

https://www.tenable.com/security/research/tra-2020-42

https://github.com/tenable/poc/blob/master/WordPress/plugins/SRS_Simple_Hits_Counter/blind_sqli_tra_2020_42.py

https://wordpress.org/plugins/srs-simple-hits-counter/

Plugin Details

Severity: High

ID: 112525

Type: remote

Published: 7/23/2020

Updated: 10/26/2022

Scan Template: scan, pci

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2020-5766

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS Score Source: CVE-2020-5766

Vulnerability Information

CPE: cpe:2.3:a:srs_simple_hits_counter_project:srs_simple_hits_counter:*:*:*:*:*:wordpress:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/13/2020

Vulnerability Publication Date: 7/13/2020

Reference Information

CVE: CVE-2020-5766