8 SQL Injections FEB 2021
WordPress Security Report
Be informed about the latest SQL Injections FEB 2021, identified and reported publicly. As these SQL Injections FEB 2021 vulnerabilities have a severe negative impact on any WordPress Security, consider our FREE security AUDIT.
An estimated 211.000+ active WordPress installations are susceptible to this attack type, considering only the publicly available numbers. The estimated number can increase by 20-25% with premium versions as they are private purchases.
Furthermore, the initial estimation can multiply if we consider the already patched versions BUT NOT UPDATED by owners, as the vulnerability remains active within their domain. As these owners start changing their hosting provider (due to constant unexplained issues), they actively migrate these vulnerabilities behind protected areas, possibly exposing other clean WP to different attack types.
It is a 33% increase compared to January 2021. Read more about our previous report here: 6 SQL Injections JAN 2021 – 200% increase spike vs. DEC 2020. The following cases made headlines PUBLICLY just last month in the SQL Injections FEB 2021 category:
- Welcart e-Commerce < 2.1.1 – Authenticated SQL Injection
- Welcart is a free e-commerce plugin for WordPress with top market share in Japan. Welcart comes with many features and customizations for making an online store. You can easily create your own original online store. Active installations: 20,000+
- WP Editor < 1.2.7 – Authenticated SQL injection
- Contact Form by Supsystic < 1.7.11 – Authenticated SQL Injections
- Simple and powerful Contact Form Builder by Supsystic with drag-and-drop editor. No coding knowledge is required. Active installations: 10,000+
- Data Tables Generator by Supsystic < 1.10.0 – Authenticated SQL Injection
- Create responsive data tables with sorting, searching, pagination, filtering and more. Easy-to-use tables, charts and data management. Active installations: 30,000+
- Membership by Supsystic <= 1.5.0 – Authenticated SQL Injection
No known fix – plugin closed – Active installations: 7,000+
- Newsletter by Supsystic <= 1.5.6 – Authenticated SQL Injection
No known fix – plugin closed – Active installations: 10,000+
- Pricing Table by Supsystic < 1.8.9 – Authenticated SQL Injections
- Create amazing pricing tables without any programming skills. It’s possible with Pricing Table WordPress plugin by Supsystic. Choose pricing table template, edit content with Pricing table builder and publish on the website. Active installations: 40,000+
- Ultimate Maps by Supsystic < 1.1.17 – Authenticated SQL Injections
No known fix – plugin closed – Active installations: 34,000+
BRIEF: SQL Injections FEB 2021 is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.
What is SQL Injections FEB 2021?
SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access.
In many cases, an attacker can modify or delete this data, causing persistent changes to the application’s content or behavior. In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack.
What is the impact of an SQL Injections FEB 2021?
A successful SQL injection attack can result in unauthorized access to sensitive data, such as passwords, credit card details, or personal user information. Many high-profile data breaches in recent years have been the result of SQL injection attacks, leading to reputational damage and regulatory fines. In some cases, an attacker can obtain a persistent backdoor into an organization’s systems, leading to a long-term compromise that can go unnoticed for an extended period.
What kind of SQL Injections are exploited?
There are a wide variety of SQL injection vulnerabilities, attacks, and techniques, which arise in different situations. Some common SQL injection examples include:
– Retrieving hidden data, where you can modify an SQL query to return additional results.
– Subverting application logic, where you can change a query to interfere with the application’s logic.
– UNION attacks, where you can retrieve data from different database tables.
– Examining the database, where you can extract information about the version and structure of the database.
– Blind SQL injection, where the results of a query you control are not returned in the application’s responses.