{"id":11393,"date":"2021-12-15T15:47:35","date_gmt":"2021-12-15T20:47:35","guid":{"rendered":"http:\/\/local.brightwhiz\/?p=11393"},"modified":"2021-12-15T15:47:37","modified_gmt":"2021-12-15T20:47:37","slug":"all-in-one-seo-vulnerabilities-wordpress-sites","status":"publish","type":"post","link":"http:\/\/local.brightwhiz\/all-in-one-seo-vulnerabilities-wordpress-sites\/","title":{"rendered":"All In One SEO Vulnerabilities (CVE-2021-25036 & CVE-2021-25037) Fixed"},"content":{"rendered":"\n
During an internal audit, security researchers at Jetpack uncovered two All In One SEO vulnerabilities described as severe. An SQL<\/a> Injection vulnerability and a Privilege Escalation bug were discovered in this popular WordPress plugin<\/a> installed 3+ million times.<\/p>\n\n\n\n If exploited these vulnerabilities could allow an attacker to gain privileged database access thereby exposing usernames and hashed passwords in addition to other data as well as allowing low-privileged accounts, like subscribers to perform remote code execution.<\/p>\n\n\n\n The Authenticated Privilege Escalation bug could grant hackers access to protected REST API endpoints they shouldn’t have access to.<\/p>\n\n\n\n All In One SEO Plugin affected releases include every version between 4.0.0 and 4.1.5.2 inclusively. The plugin developers<\/a> recently patched and released version 4.1.5.3.<\/p>\n\n\n\n This vulnerability could be exploited via the Since the said method is not designed to escape quotes, an attacker could still inject them and force the query to leak sensitive information from the database, like user credentials.<\/p>\n\n\n\n Normally the above endpoint is not meant to be accessible to users with low-privileged accounts, the Authenticated Privilege Escalation bug makes it possible for an attacker to abuse this vulnerability.<\/p>\n\n\n\n Every All In One SEO plugin release between 4.1.3.1 and 4.1.5.2 inclusively is affected.<\/p>\n\n\n\n You can see more details about these WordPress<\/a> All In One SEO vulnerabilities from this JetPack post here<\/a>.<\/p>\n\n\n\n We strongly recommend that affected users update to the latest plugin version immediately and that you share this post within the WordPress community<\/a> to create awareness among site owners about these vulnerabilities and how to stay safe from any attacks.<\/p>\n","protected":false},"excerpt":{"rendered":" During an internal audit, security researchers at Jetpack uncovered two All In One SEO vulnerabilities described as severe. An SQL Injection vulnerability and a Privilege Escalation bug were discovered in…<\/p>\n","protected":false},"author":1,"featured_media":11395,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,28,16,18],"tags":[142,313,320,350,424,452,460,471,526,544,635,638,651],"yoast_head":"\nAuthenticated Privilege Escalation (CVE-2021-25036)<\/h2>\n\n\n\n
Authenticated SQL Injection (CVE-2021-25037)<\/h2>\n\n\n\n
PostsTerms::searchForObjects()<\/code> method, which is accessible via the
\/wp-json\/aioseo\/v1\/objects<\/code> REST API route only escaped user input using
wpdb::esc_like()<\/code> before appending the input to an SQL query.<\/p>\n\n\n\n
Conclusion<\/h2>\n\n\n\n