The SQL injection vulnerability in the Hide My WP WordPress plugin (versions <= 6.2.3) is possible because of how the IP address is retrieved and used inside a SQL query. The function "hmwp_get_user_ip" tries to retrieve the IP address from multiple headers, including IP address headers that the user can spoof, such as "X-Forwarded-For." As a result, the malicious payload supplied in one of these IP address headers will be directly inserted into the SQL query, making SQL injection possible.
Fixes

Solution

Update to 6.2.4 or higher version.


Workaround

No workaround given by the vendor.

History

Fri, 28 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2025-03-28T16:45:57.640Z

Reserved: 2021-07-19T00:00:00.000Z

Link: CVE-2021-36916

cve-icon Vulnrichment

Updated: 2024-08-04T01:01:59.552Z

cve-icon NVD

Status : Modified

Published: 2021-11-24T17:15:07.857

Modified: 2024-11-21T06:14:17.957

Link: CVE-2021-36916

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.