CVE-2022-21661

WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to improper sanitization in WP_Query, there can be cases where SQL injection is possible through plugins or themes that use it in a certain way. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this vulnerability.
References
Link Resource
http://packetstormsecurity.com/files/165540/WordPress-Core-5.8.2-SQL-Injection.html Exploit Third Party Advisory VDB Entry
https://github.com/WordPress/wordpress-develop/commit/17efac8c8ec64555eff5cf51a3eff81e06317214 Patch Third Party Advisory
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-6676-cqfm-gw84 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/
https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/ Release Notes Vendor Advisory
https://www.debian.org/security/2022/dsa-5039 Third Party Advisory
https://www.exploit-db.com/exploits/50663 Exploit Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-22-020/ Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/165540/WordPress-Core-5.8.2-SQL-Injection.html Exploit Third Party Advisory VDB Entry
https://github.com/WordPress/wordpress-develop/commit/17efac8c8ec64555eff5cf51a3eff81e06317214 Patch Third Party Advisory
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-6676-cqfm-gw84 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/
https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/ Release Notes Vendor Advisory
https://www.debian.org/security/2022/dsa-5039 Third Party Advisory
https://www.exploit-db.com/exploits/50663 Exploit Third Party Advisory VDB Entry
https://www.vicarius.io/vsociety/posts/understanding-the-wordpress-sql-injection-vulnerability-cve-2022-21661
https://www.zerodayinitiative.com/advisories/ZDI-22-020/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:45

Type Values Removed Values Added
References
  • () https://www.vicarius.io/vsociety/posts/understanding-the-wordpress-sql-injection-vulnerability-cve-2022-21661 -
References () http://packetstormsecurity.com/files/165540/WordPress-Core-5.8.2-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/165540/WordPress-Core-5.8.2-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/WordPress/wordpress-develop/commit/17efac8c8ec64555eff5cf51a3eff81e06317214 - Patch, Third Party Advisory () https://github.com/WordPress/wordpress-develop/commit/17efac8c8ec64555eff5cf51a3eff81e06317214 - Patch, Third Party Advisory
References () https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-6676-cqfm-gw84 - Third Party Advisory () https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-6676-cqfm-gw84 - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/ -
References () https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/ - Release Notes, Vendor Advisory () https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/ - Release Notes, Vendor Advisory
References () https://www.debian.org/security/2022/dsa-5039 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5039 - Third Party Advisory
References () https://www.exploit-db.com/exploits/50663 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/50663 - Exploit, Third Party Advisory, VDB Entry
References () https://www.zerodayinitiative.com/advisories/ZDI-22-020/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-22-020/ - Third Party Advisory, VDB Entry
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 8.0

07 Nov 2023, 03:43

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/', 'name': 'FEDORA-2022-8472dd59ff', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/', 'name': 'FEDORA-2022-e37e1e6c7a', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/ -

Information

Published : 2022-01-06 23:15

Updated : 2024-11-21 06:45


NVD link : CVE-2022-21661

Mitre link : CVE-2022-21661

CVE.ORG link : CVE-2022-21661


JSON object : View

Products Affected

fedoraproject

  • fedora

wordpress

  • wordpress

debian

  • debian_linux
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')