CVE-2021-36916 (GCVE-0-2021-36916)

Vulnerability from cvelistv5 – Published: 2021-11-24 16:29 – Updated: 2025-03-28 16:45
VLAI?
Title
WordPress Hide My WP premium plugin <= 6.2.3 - Unauthenticated SQL injection (SQLi) vulnerability
Summary
The SQL injection vulnerability in the Hide My WP WordPress plugin (versions <= 6.2.3) is possible because of how the IP address is retrieved and used inside a SQL query. The function "hmwp_get_user_ip" tries to retrieve the IP address from multiple headers, including IP address headers that the user can spoof, such as "X-Forwarded-For." As a result, the malicious payload supplied in one of these IP address headers will be directly inserted into the SQL query, making SQL injection possible.
CWE
Assigner
Impacted products
Vendor Product Version
wpWave Hide My WP (WordPress plugin) Affected: <= 6.2.3 , ≤ 6.2.3 (custom)
Create a notification for this product.
Credits
Vulnerability discovered by Dave Jong (Patchstack).
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:01:59.552Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://patchstack.com/hide-my-wp-vulnerabilities-fixed/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-36916",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-28T16:45:53.691658Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-28T16:45:57.640Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Hide My WP (WordPress plugin)",
          "vendor": "wpWave",
          "versions": [
            {
              "lessThanOrEqual": "6.2.3",
              "status": "affected",
              "version": "\u003c= 6.2.3",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Vulnerability discovered by Dave Jong (Patchstack)."
        }
      ],
      "datePublic": "2021-11-24T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SQL injection vulnerability in the Hide My WP WordPress plugin (versions \u003c= 6.2.3) is possible because of how the IP address is retrieved and used inside a SQL query. The function \"hmwp_get_user_ip\" tries to retrieve the IP address from multiple headers, including IP address headers that the user can spoof, such as \"X-Forwarded-For.\" As a result, the malicious payload supplied in one of these IP address headers will be directly inserted into the SQL query, making SQL injection possible."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-89",
              "description": "CWE-89 SQL Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-24T16:29:41.000Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://patchstack.com/hide-my-wp-vulnerabilities-fixed/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Update to 6.2.4 or higher version."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "WordPress Hide My WP premium plugin \u003c= 6.2.3 - Unauthenticated SQL injection (SQLi) vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "audit@patchstack.com",
          "DATE_PUBLIC": "2021-11-24T13:53:00.000Z",
          "ID": "CVE-2021-36916",
          "STATE": "PUBLIC",
          "TITLE": "WordPress Hide My WP premium plugin \u003c= 6.2.3 - Unauthenticated SQL injection (SQLi) vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Hide My WP (WordPress plugin)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "\u003c= 6.2.3",
                            "version_value": "6.2.3"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "wpWave"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Vulnerability discovered by Dave Jong (Patchstack)."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SQL injection vulnerability in the Hide My WP WordPress plugin (versions \u003c= 6.2.3) is possible because of how the IP address is retrieved and used inside a SQL query. The function \"hmwp_get_user_ip\" tries to retrieve the IP address from multiple headers, including IP address headers that the user can spoof, such as \"X-Forwarded-For.\" As a result, the malicious payload supplied in one of these IP address headers will be directly inserted into the SQL query, making SQL injection possible."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-89 SQL Injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158",
              "refsource": "CONFIRM",
              "url": "https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158"
            },
            {
              "name": "https://patchstack.com/hide-my-wp-vulnerabilities-fixed/",
              "refsource": "MISC",
              "url": "https://patchstack.com/hide-my-wp-vulnerabilities-fixed/"
            },
            {
              "name": "https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability",
              "refsource": "MISC",
              "url": "https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Update to 6.2.4 or higher version."
          }
        ],
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2021-36916",
    "datePublished": "2021-11-24T16:29:41.073Z",
    "dateReserved": "2021-07-19T00:00:00.000Z",
    "dateUpdated": "2025-03-28T16:45:57.640Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wpwave:hide_my_wp:*:*:*:*:*:wordpress:*:*\", \"versionEndIncluding\": \"6.2.3\", \"matchCriteriaId\": \"EE2E78B7-574B-4AFD-9718-CAA0FC5FCC44\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The SQL injection vulnerability in the Hide My WP WordPress plugin (versions \u003c= 6.2.3) is possible because of how the IP address is retrieved and used inside a SQL query. The function \\\"hmwp_get_user_ip\\\" tries to retrieve the IP address from multiple headers, including IP address headers that the user can spoof, such as \\\"X-Forwarded-For.\\\" As a result, the malicious payload supplied in one of these IP address headers will be directly inserted into the SQL query, making SQL injection possible.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de inyecci\\u00f3n SQL en el plugin Hide My WP de WordPress (versiones anteriores a 6.2.3 incluy\\u00e9ndola) es posible debido a la forma en que la direcci\\u00f3n IP es recuperada y usada dentro de una consulta SQL. La funci\\u00f3n \\\"hmwp_get_user_ip\\\" intenta recuperar la direcci\\u00f3n IP a partir de m\\u00faltiples encabezados, incluyendo encabezados de direcci\\u00f3n IP que el usuario puede falsear, como \\\"X-Forwarded-For\\\". Como resultado, la carga \\u00fatil maliciosa suministrada en uno de estos encabezados de direcci\\u00f3n IP ser\\u00e1 insertado directamente en la consulta SQL, haciendo posible una inyecci\\u00f3n SQL\"}]",
      "id": "CVE-2021-36916",
      "lastModified": "2024-11-21T06:14:17.957",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"audit@patchstack.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L\", \"baseScore\": 8.6, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 4.7}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2021-11-24T17:15:07.857",
      "references": "[{\"url\": \"https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158\", \"source\": \"audit@patchstack.com\", \"tags\": [\"Product\"]}, {\"url\": \"https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability\", \"source\": \"audit@patchstack.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://patchstack.com/hide-my-wp-vulnerabilities-fixed/\", \"source\": \"audit@patchstack.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\"]}, {\"url\": \"https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://patchstack.com/hide-my-wp-vulnerabilities-fixed/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}]",
      "sourceIdentifier": "audit@patchstack.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"audit@patchstack.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-89\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-89\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-36916\",\"sourceIdentifier\":\"audit@patchstack.com\",\"published\":\"2021-11-24T17:15:07.857\",\"lastModified\":\"2024-11-21T06:14:17.957\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The SQL injection vulnerability in the Hide My WP WordPress plugin (versions \u003c= 6.2.3) is possible because of how the IP address is retrieved and used inside a SQL query. The function \\\"hmwp_get_user_ip\\\" tries to retrieve the IP address from multiple headers, including IP address headers that the user can spoof, such as \\\"X-Forwarded-For.\\\" As a result, the malicious payload supplied in one of these IP address headers will be directly inserted into the SQL query, making SQL injection possible.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de inyecci\u00f3n SQL en el plugin Hide My WP de WordPress (versiones anteriores a 6.2.3 incluy\u00e9ndola) es posible debido a la forma en que la direcci\u00f3n IP es recuperada y usada dentro de una consulta SQL. La funci\u00f3n \\\"hmwp_get_user_ip\\\" intenta recuperar la direcci\u00f3n IP a partir de m\u00faltiples encabezados, incluyendo encabezados de direcci\u00f3n IP que el usuario puede falsear, como \\\"X-Forwarded-For\\\". Como resultado, la carga \u00fatil maliciosa suministrada en uno de estos encabezados de direcci\u00f3n IP ser\u00e1 insertado directamente en la consulta SQL, haciendo posible una inyecci\u00f3n SQL\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"audit@patchstack.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":4.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"audit@patchstack.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wpwave:hide_my_wp:*:*:*:*:*:wordpress:*:*\",\"versionEndIncluding\":\"6.2.3\",\"matchCriteriaId\":\"EE2E78B7-574B-4AFD-9718-CAA0FC5FCC44\"}]}]}],\"references\":[{\"url\":\"https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158\",\"source\":\"audit@patchstack.com\",\"tags\":[\"Product\"]},{\"url\":\"https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability\",\"source\":\"audit@patchstack.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://patchstack.com/hide-my-wp-vulnerabilities-fixed/\",\"source\":\"audit@patchstack.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://patchstack.com/hide-my-wp-vulnerabilities-fixed/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://patchstack.com/hide-my-wp-vulnerabilities-fixed/\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T01:01:59.552Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-36916\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-28T16:45:53.691658Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-28T16:45:47.844Z\"}}], \"cna\": {\"title\": \"WordPress Hide My WP premium plugin \u003c= 6.2.3 - Unauthenticated SQL injection (SQLi) vulnerability\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"value\": \"Vulnerability discovered by Dave Jong (Patchstack).\"}], \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"wpWave\", \"product\": \"Hide My WP (WordPress plugin)\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c= 6.2.3\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.2.3\"}]}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Update to 6.2.4 or higher version.\"}], \"datePublic\": \"2021-11-24T00:00:00.000Z\", \"references\": [{\"url\": \"https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://patchstack.com/hide-my-wp-vulnerabilities-fixed/\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability\", \"tags\": [\"x_refsource_MISC\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"The SQL injection vulnerability in the Hide My WP WordPress plugin (versions \u003c= 6.2.3) is possible because of how the IP address is retrieved and used inside a SQL query. The function \\\"hmwp_get_user_ip\\\" tries to retrieve the IP address from multiple headers, including IP address headers that the user can spoof, such as \\\"X-Forwarded-For.\\\" As a result, the malicious payload supplied in one of these IP address headers will be directly inserted into the SQL query, making SQL injection possible.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-89\", \"description\": \"CWE-89 SQL Injection\"}]}], \"providerMetadata\": {\"orgId\": \"21595511-bba5-4825-b968-b78d1f9984a3\", \"shortName\": \"Patchstack\", \"dateUpdated\": \"2021-11-24T16:29:41.000Z\"}, \"x_legacyV4Record\": {\"credit\": [{\"lang\": \"eng\", \"value\": \"Vulnerability discovered by Dave Jong (Patchstack).\"}], \"impact\": {\"cvss\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, \"source\": {\"discovery\": \"EXTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_name\": \"\u003c= 6.2.3\", \"version_value\": \"6.2.3\", \"version_affected\": \"\u003c=\"}]}, \"product_name\": \"Hide My WP (WordPress plugin)\"}]}, \"vendor_name\": \"wpWave\"}]}}, \"solution\": [{\"lang\": \"en\", \"value\": \"Update to 6.2.4 or higher version.\"}], \"data_type\": \"CVE\", \"generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"references\": {\"reference_data\": [{\"url\": \"https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158\", \"name\": \"https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://patchstack.com/hide-my-wp-vulnerabilities-fixed/\", \"name\": \"https://patchstack.com/hide-my-wp-vulnerabilities-fixed/\", \"refsource\": \"MISC\"}, {\"url\": \"https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability\", \"name\": \"https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"The SQL injection vulnerability in the Hide My WP WordPress plugin (versions \u003c= 6.2.3) is possible because of how the IP address is retrieved and used inside a SQL query. The function \\\"hmwp_get_user_ip\\\" tries to retrieve the IP address from multiple headers, including IP address headers that the user can spoof, such as \\\"X-Forwarded-For.\\\" As a result, the malicious payload supplied in one of these IP address headers will be directly inserted into the SQL query, making SQL injection possible.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-89 SQL Injection\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2021-36916\", \"STATE\": \"PUBLIC\", \"TITLE\": \"WordPress Hide My WP premium plugin \u003c= 6.2.3 - Unauthenticated SQL injection (SQLi) vulnerability\", \"ASSIGNER\": \"audit@patchstack.com\", \"DATE_PUBLIC\": \"2021-11-24T13:53:00.000Z\"}}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-36916\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-28T16:45:57.640Z\", \"dateReserved\": \"2021-07-19T00:00:00.000Z\", \"assignerOrgId\": \"21595511-bba5-4825-b968-b78d1f9984a3\", \"datePublished\": \"2021-11-24T16:29:41.073Z\", \"assignerShortName\": \"Patchstack\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…