exploitdb
WORKING POC
by Aryan Chehreghani · textwebappsphp
https://www.exploit-db.com/exploits/50663
This exploit demonstrates a SQL injection vulnerability in WordPress Core versions prior to 5.8.3 via the WP_Query class. The PoC provides a sample HTTP request that injects malicious input into the 'tax_query' parameter, allowing an attacker to disclose sensitive information from the database.
Classification
Working Poc 90%
Target:
WordPress Core < 5.8.3
No auth needed
Prerequisites:
Access to the target WordPress site · Network connectivity to the target
nomisec
SCANNER
28 stars
by z92g · infoleak
https://github.com/z92g/CVE-2022-21661
This repository contains a Go-based scanner for detecting CVE-2022-21661, a SQL injection vulnerability in WordPress versions 4.1 to 5.8.2. It checks for the vulnerability by sending crafted payloads to the target's admin-ajax.php endpoint and analyzing responses.
Classification
Scanner 95%
Target:
WordPress v4.1~v5.8.2
No auth needed
Prerequisites:
Target must be running a vulnerable version of WordPress · Target's admin-ajax.php endpoint must be accessible
nomisec
WORKING POC
17 stars
by purple-WL · infoleak
https://github.com/purple-WL/wordpress-CVE-2022-21661
This PoC demonstrates an out-of-band SQL injection vulnerability in WordPress versions prior to 5.8.3. The exploit leverages a crafted POST request to admin-ajax.php, using the tax_query parameter to trigger a DNS-based exfiltration of the database version via load_file.
Classification
Working Poc 90%
Target:
WordPress < 5.8.3
Auth required
Prerequisites:
Access to wp-admin/admin-ajax.php · Valid authentication credentials · DNS exfiltration service (e.g., ceye.io)
nomisec
WORKING POC
14 stars
by 0x4E0x650x6F · infoleak
https://github.com/0x4E0x650x6F/Wordpress-cve-CVE-2022-21661
This repository contains a proof-of-concept exploit for CVE-2022-21661, a vulnerability in the Ele Custom Skin WordPress plugin. The exploit involves a Docker setup to replicate the vulnerable environment and includes the plugin files necessary to demonstrate the vulnerability.
Classification
Working Poc 90%
Target:
Ele Custom Skin WordPress plugin
No auth needed
Prerequisites:
Docker environment · WordPress installation
nomisec
WORKING POC
7 stars
by guestzz · poc
https://github.com/guestzz/CVE-2022-21661
This repository contains a Python-based exploit for CVE-2022-21661, targeting a SQL injection vulnerability in the Elementor Custom Skin plugin for WordPress. The exploit includes methods for information gathering, user credential extraction via time-based blind SQL injection, and DNS exfiltration.
Classification
Working Poc 95%
Target:
Elementor Custom Skin plugin for WordPress
No auth needed
Prerequisites:
Target must have the vulnerable Elementor Custom Skin plugin installed · WordPress installation must be accessible
nomisec
WORKING POC
6 stars
by WellingtonEspindula · remote
https://github.com/WellingtonEspindula/SSI-CVE-2022-21661
This repository contains a functional exploit for CVE-2022-21661, a SQL injection vulnerability in WordPress versions below 5.8.3. The exploit uses time-based blind SQL injection to extract database names and user credentials, including password hashes.
Classification
Working Poc 95%
Target:
WordPress < 5.8.3
No auth needed
Prerequisites:
Docker · Docker-Compose · Python 3.9+ · Argparser · Hashcat
nomisec
WORKING POC
6 stars
by sealldeveloper · remote
https://github.com/sealldeveloper/CVE-2022-21661-PoC
This is a Python-based PoC for CVE-2022-21661, a SQL injection vulnerability in WordPress. It tests for vulnerability by sending crafted requests to the admin-ajax.php endpoint and checks for responses indicating successful exploitation via MD5 hash extraction or time-based delays.
Classification
Working Poc 95%
Target:
WordPress (specific version not specified in PoC)
No auth needed
Prerequisites:
Access to the target WordPress instance's admin-ajax.php endpoint
nomisec
WORKING POC
2 stars
by daniel616 · remote
https://github.com/daniel616/CVE-2022-21661-Demo
This repository demonstrates a SQL injection vulnerability in WordPress 5.8.2 via a malicious plugin that exploits unsanitized input in class-wp-tax-query.php. The PoC includes a Docker setup and a blind SQLi example using time delays.
Classification
Working Poc 90%
Target:
WordPress 5.8.2
Auth required
Prerequisites:
WordPress 5.8.2 installation · Ability to install a malicious plugin · Unsanitized user input passed to $terms variable
nomisec
STUB
by 7rootsec · poc
https://github.com/7rootsec/CVE-2022-21661-Technical-Analysis
The repository contains only a README file with minimal content, lacking any technical analysis or exploit code for CVE-2022-21661. No functional exploit or detailed writeup is present.
Target:
unknown
No auth needed
nomisec
WORKING POC
by Fauzan-Aldi · infoleak
https://github.com/Fauzan-Aldi/CVE-2022-21661
This is a Python-based PoC for CVE-2022-21661, a WordPress vulnerability that allows unauthenticated object injection, potentially leading to RCE. The script checks for vulnerability by testing SQL injection via MD5 hash extraction and time-based queries.
Classification
Working Poc 95%
Target:
WordPress (specific version not specified)
No auth needed
Prerequisites:
Target must be a WordPress instance with vulnerable admin-ajax.php endpoint
nomisec
WORKING POC
by w0r1i0g1ht · infoleak
https://github.com/w0r1i0g1ht/CVE-2022-21661
This repository contains a proof-of-concept exploit for CVE-2022-21661, a SQL injection vulnerability in WordPress. The PoC includes a malicious HTTP request that leverages a crafted `tax_query` parameter to extract database information, such as the MySQL version.
Classification
Working Poc 90%
Target:
WordPress (specific version not specified)
No auth needed
Prerequisites:
Access to a vulnerable WordPress instance · Ability to send crafted HTTP requests to the target
nomisec
WRITEUP
by CharonDefalt · infoleak
https://github.com/CharonDefalt/WordPress--CVE-2022-21661
This repository contains a README file referencing CVE-2022-21661, a SQL Injection vulnerability in WordPress Core 5.8.2 via 'WP_Query'. It includes a link to an ExploitDB entry and a screenshot but no actual exploit code.
Classification
Writeup 90%
Target:
WordPress Core 5.8.2
No auth needed
Prerequisites:
Access to a vulnerable WordPress instance
nomisec
SCANNER
by p4ncontomat3 · remote-auth
https://github.com/p4ncontomat3/CVE-2022-21661
This repository contains a Python-based scanner for detecting CVE-2022-21661, a SQL injection vulnerability in WordPress. The scanner checks for the vulnerability by sending crafted payloads to the target and analyzing responses.
Classification
Scanner 95%
Target:
WordPress (specific version not specified)
No auth needed
Prerequisites:
Access to the target WordPress admin-ajax.php endpoint
nomisec
WRITEUP
by safe3s · poc
https://github.com/safe3s/CVE-2022-21661
This repository contains a README describing CVE-2022-21661, an SQL injection vulnerability in WordPress Core 5.8.2 via 'WP_Query'. It references an ExploitDB entry and includes a link to a PoC video.
Classification
Writeup 80%
Target:
WordPress Core 5.8.2
No auth needed
Prerequisites:
Access to a vulnerable WordPress instance