Skip to main content

CVE-2022-3150: CWE-89 SQL Injection in Unknown WP Custom Cursors | WordPress Cursor Plugin

High
VulnerabilityCVE-2022-3150cvecve-2022-3150cwe-89
Published: Mon Oct 17 2022 (10/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: WP Custom Cursors | WordPress Cursor Plugin

Description

The WP Custom Cursors WordPress plugin before 3.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privileged users such as admin

AI-Powered Analysis

AILast updated: 07/06/2025, 14:11:35 UTC

Technical Analysis

CVE-2022-3150 is a high-severity SQL Injection vulnerability identified in the WP Custom Cursors WordPress plugin versions prior to 3.2. This plugin allows users to customize the cursor appearance on WordPress sites. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input before incorporating it into SQL queries. Specifically, a parameter used in the plugin's backend SQL statements is vulnerable to injection attacks. Exploitation requires a high-privileged user context, such as an administrator, to inject malicious SQL code. Successful exploitation can lead to unauthorized disclosure, modification, or deletion of data within the WordPress database, impacting confidentiality, integrity, and availability. The CVSS v3.1 score is 7.2, reflecting network exploitable conditions with low attack complexity, but requiring high privileges and no user interaction. No known public exploits have been reported yet, and no official patches or updates have been linked, although the vulnerability was published in October 2022. The vulnerability is categorized under CWE-89, which is a common and critical injection flaw type affecting many web applications. Given the widespread use of WordPress and the popularity of customization plugins, this vulnerability poses a significant risk to affected sites if not remediated promptly.

Potential Impact

For European organizations, the impact of CVE-2022-3150 can be substantial, particularly for those relying on WordPress for their web presence and using the WP Custom Cursors plugin. Exploitation could lead to unauthorized access to sensitive customer or business data stored in the WordPress database, potentially violating GDPR requirements for data protection and privacy. Data integrity could be compromised, affecting website content and user trust. Availability of the website could also be disrupted if attackers modify or delete critical data. Since the vulnerability requires administrator-level access to exploit, the risk is higher in environments where multiple users have elevated privileges or where credential compromise is possible. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits over time. European organizations with e-commerce, governmental, or critical service websites running vulnerable versions of this plugin are particularly at risk of reputational damage, financial loss, and regulatory penalties.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately identify and inventory WordPress sites using the WP Custom Cursors plugin and verify the plugin version. 2) Upgrade the plugin to version 3.2 or later where the vulnerability is fixed; if no official patch exists, consider disabling or removing the plugin until a secure version is available. 3) Restrict administrator privileges to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of privilege abuse. 4) Conduct regular security audits and monitoring of WordPress logs to detect suspicious database queries or unauthorized access attempts. 5) Implement Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting WordPress plugins. 6) Backup WordPress databases regularly and ensure backups are stored securely to enable recovery in case of data tampering. 7) Educate site administrators on secure plugin management and the risks of installing unverified plugins. These steps go beyond generic advice by focusing on plugin-specific actions, privilege management, and proactive monitoring tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-09-07T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec904

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 2:11:35 PM

Last updated: 8/1/2025, 9:57:56 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats