
Cloud Vulnerability DB
A community-led vulnerabilities database
The WP Statistics WordPress plugin version 13.1.5 and earlier was found to be vulnerable to SQL Injection due to insufficient escaping and parameterization of the current_page_id parameter. This vulnerability was discovered in February 2022 and affected over 600,000 active installations (Xib3rR4dAr).
The vulnerability exists in the /wp-json/wp-statistics/v2/hit endpoint when 'Cache Compatibility' is enabled in WP-Statistics settings. Multiple parameters were found to be vulnerable to SQL injection, including current_page_id (Integer-based), current_page_type, and ip (String-based). The vulnerability is tracked as CVE-2022-25148 with a CVSS score of 9.8 (Critical) (Wordfence).
If exploited, this vulnerability could allow an unauthenticated attacker to perform SQL injection attacks against the affected WordPress installations, potentially leading to unauthorized access to or manipulation of the database (NVD).
The vulnerability was patched in WP Statistics version 13.1.6. Site administrators are strongly advised to update to this version or newer to protect against this vulnerability (Trend Micro).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."