The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the current_page_type parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5.
Fixes

Solution

Update to version 13.1.6 or newer.


Workaround

No workaround given by the vendor.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.49877}

epss

{'score': 0.48505}


Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.48505}

epss

{'score': 0.49877}


Fri, 31 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-01-31T19:02:18.407Z

Reserved: 2022-02-16T00:00:00.000Z

Link: CVE-2022-0651

cve-icon Vulnrichment

Updated: 2024-08-02T23:32:46.543Z

cve-icon NVD

Status : Modified

Published: 2022-02-24T19:15:09.857

Modified: 2024-11-21T06:39:06.743

Link: CVE-2022-0651

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.