Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-3150: CWE-89 SQL Injection in Unknown WP Custom Cursors | WordPress Cursor Plugin

0
High
VulnerabilityCVE-2022-3150cvecve-2022-3150cwe-89
Published: Mon Oct 17 2022 (10/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: WP Custom Cursors | WordPress Cursor Plugin

Description

The WP Custom Cursors WordPress plugin before 3.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privileged users such as admin

AI-Powered Analysis

AILast updated: 07/06/2025, 14:11:35 UTC

Technical Analysis

CVE-2022-3150 is a high-severity SQL Injection vulnerability identified in the WP Custom Cursors WordPress plugin versions prior to 3.2. This plugin allows users to customize the cursor appearance on WordPress sites. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input before incorporating it into SQL queries. Specifically, a parameter used in the plugin's backend SQL statements is vulnerable to injection attacks. Exploitation requires a high-privileged user context, such as an administrator, to inject malicious SQL code. Successful exploitation can lead to unauthorized disclosure, modification, or deletion of data within the WordPress database, impacting confidentiality, integrity, and availability. The CVSS v3.1 score is 7.2, reflecting network exploitable conditions with low attack complexity, but requiring high privileges and no user interaction. No known public exploits have been reported yet, and no official patches or updates have been linked, although the vulnerability was published in October 2022. The vulnerability is categorized under CWE-89, which is a common and critical injection flaw type affecting many web applications. Given the widespread use of WordPress and the popularity of customization plugins, this vulnerability poses a significant risk to affected sites if not remediated promptly.

Potential Impact

For European organizations, the impact of CVE-2022-3150 can be substantial, particularly for those relying on WordPress for their web presence and using the WP Custom Cursors plugin. Exploitation could lead to unauthorized access to sensitive customer or business data stored in the WordPress database, potentially violating GDPR requirements for data protection and privacy. Data integrity could be compromised, affecting website content and user trust. Availability of the website could also be disrupted if attackers modify or delete critical data. Since the vulnerability requires administrator-level access to exploit, the risk is higher in environments where multiple users have elevated privileges or where credential compromise is possible. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits over time. European organizations with e-commerce, governmental, or critical service websites running vulnerable versions of this plugin are particularly at risk of reputational damage, financial loss, and regulatory penalties.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately identify and inventory WordPress sites using the WP Custom Cursors plugin and verify the plugin version. 2) Upgrade the plugin to version 3.2 or later where the vulnerability is fixed; if no official patch exists, consider disabling or removing the plugin until a secure version is available. 3) Restrict administrator privileges to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of privilege abuse. 4) Conduct regular security audits and monitoring of WordPress logs to detect suspicious database queries or unauthorized access attempts. 5) Implement Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting WordPress plugins. 6) Backup WordPress databases regularly and ensure backups are stored securely to enable recovery in case of data tampering. 7) Educate site administrators on secure plugin management and the risks of installing unverified plugins. These steps go beyond generic advice by focusing on plugin-specific actions, privilege management, and proactive monitoring tailored to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-09-07T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec904

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 2:11:35 PM

Last updated: 2/7/2026, 2:28:31 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats