The SQL injection vulnerability in the Hide My WP WordPress plugin (versions <= 6.2.3) is possible because of how the IP address is retrieved and used inside a SQL query. The function "hmwp_get_user_ip" tries to retrieve the IP address from multiple headers, including IP address headers that the user can spoof, such as "X-Forwarded-For." As a result, the malicious payload supplied in one of these IP address headers will be directly inserted into the SQL query, making SQL injection possible.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-23492 | The SQL injection vulnerability in the Hide My WP WordPress plugin (versions <= 6.2.3) is possible because of how the IP address is retrieved and used inside a SQL query. The function "hmwp_get_user_ip" tries to retrieve the IP address from multiple headers, including IP address headers that the user can spoof, such as "X-Forwarded-For." As a result, the malicious payload supplied in one of these IP address headers will be directly inserted into the SQL query, making SQL injection possible. |
Fixes
Solution
Update to 6.2.4 or higher version.
Workaround
No workaround given by the vendor.
References
History
Fri, 28 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2025-03-28T16:45:57.640Z
Reserved: 2021-07-19T00:00:00.000Z
Link: CVE-2021-36916
Updated: 2024-08-04T01:01:59.552Z
Status : Modified
Published: 2021-11-24T17:15:07.857
Modified: 2024-11-21T06:14:17.957
Link: CVE-2021-36916
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD