CVE-2022-3150: CWE-89 SQL Injection in Unknown WP Custom Cursors | WordPress Cursor Plugin
The WP Custom Cursors WordPress plugin before 3.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privileged users such as admin
AI Analysis
Technical Summary
CVE-2022-3150 is a high-severity SQL Injection vulnerability identified in the WP Custom Cursors WordPress plugin versions prior to 3.2. This plugin allows users to customize the cursor appearance on WordPress sites. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input before incorporating it into SQL queries. Specifically, a parameter used in the plugin's backend SQL statements is vulnerable to injection attacks. Exploitation requires a high-privileged user context, such as an administrator, to inject malicious SQL code. Successful exploitation can lead to unauthorized disclosure, modification, or deletion of data within the WordPress database, impacting confidentiality, integrity, and availability. The CVSS v3.1 score is 7.2, reflecting network exploitable conditions with low attack complexity, but requiring high privileges and no user interaction. No known public exploits have been reported yet, and no official patches or updates have been linked, although the vulnerability was published in October 2022. The vulnerability is categorized under CWE-89, which is a common and critical injection flaw type affecting many web applications. Given the widespread use of WordPress and the popularity of customization plugins, this vulnerability poses a significant risk to affected sites if not remediated promptly.
Potential Impact
For European organizations, the impact of CVE-2022-3150 can be substantial, particularly for those relying on WordPress for their web presence and using the WP Custom Cursors plugin. Exploitation could lead to unauthorized access to sensitive customer or business data stored in the WordPress database, potentially violating GDPR requirements for data protection and privacy. Data integrity could be compromised, affecting website content and user trust. Availability of the website could also be disrupted if attackers modify or delete critical data. Since the vulnerability requires administrator-level access to exploit, the risk is higher in environments where multiple users have elevated privileges or where credential compromise is possible. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits over time. European organizations with e-commerce, governmental, or critical service websites running vulnerable versions of this plugin are particularly at risk of reputational damage, financial loss, and regulatory penalties.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately identify and inventory WordPress sites using the WP Custom Cursors plugin and verify the plugin version. 2) Upgrade the plugin to version 3.2 or later where the vulnerability is fixed; if no official patch exists, consider disabling or removing the plugin until a secure version is available. 3) Restrict administrator privileges to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of privilege abuse. 4) Conduct regular security audits and monitoring of WordPress logs to detect suspicious database queries or unauthorized access attempts. 5) Implement Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting WordPress plugins. 6) Backup WordPress databases regularly and ensure backups are stored securely to enable recovery in case of data tampering. 7) Educate site administrators on secure plugin management and the risks of installing unverified plugins. These steps go beyond generic advice by focusing on plugin-specific actions, privilege management, and proactive monitoring tailored to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-3150: CWE-89 SQL Injection in Unknown WP Custom Cursors | WordPress Cursor Plugin
Description
The WP Custom Cursors WordPress plugin before 3.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privileged users such as admin
AI-Powered Analysis
Technical Analysis
CVE-2022-3150 is a high-severity SQL Injection vulnerability identified in the WP Custom Cursors WordPress plugin versions prior to 3.2. This plugin allows users to customize the cursor appearance on WordPress sites. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input before incorporating it into SQL queries. Specifically, a parameter used in the plugin's backend SQL statements is vulnerable to injection attacks. Exploitation requires a high-privileged user context, such as an administrator, to inject malicious SQL code. Successful exploitation can lead to unauthorized disclosure, modification, or deletion of data within the WordPress database, impacting confidentiality, integrity, and availability. The CVSS v3.1 score is 7.2, reflecting network exploitable conditions with low attack complexity, but requiring high privileges and no user interaction. No known public exploits have been reported yet, and no official patches or updates have been linked, although the vulnerability was published in October 2022. The vulnerability is categorized under CWE-89, which is a common and critical injection flaw type affecting many web applications. Given the widespread use of WordPress and the popularity of customization plugins, this vulnerability poses a significant risk to affected sites if not remediated promptly.
Potential Impact
For European organizations, the impact of CVE-2022-3150 can be substantial, particularly for those relying on WordPress for their web presence and using the WP Custom Cursors plugin. Exploitation could lead to unauthorized access to sensitive customer or business data stored in the WordPress database, potentially violating GDPR requirements for data protection and privacy. Data integrity could be compromised, affecting website content and user trust. Availability of the website could also be disrupted if attackers modify or delete critical data. Since the vulnerability requires administrator-level access to exploit, the risk is higher in environments where multiple users have elevated privileges or where credential compromise is possible. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits over time. European organizations with e-commerce, governmental, or critical service websites running vulnerable versions of this plugin are particularly at risk of reputational damage, financial loss, and regulatory penalties.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately identify and inventory WordPress sites using the WP Custom Cursors plugin and verify the plugin version. 2) Upgrade the plugin to version 3.2 or later where the vulnerability is fixed; if no official patch exists, consider disabling or removing the plugin until a secure version is available. 3) Restrict administrator privileges to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of privilege abuse. 4) Conduct regular security audits and monitoring of WordPress logs to detect suspicious database queries or unauthorized access attempts. 5) Implement Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting WordPress plugins. 6) Backup WordPress databases regularly and ensure backups are stored securely to enable recovery in case of data tampering. 7) Educate site administrators on secure plugin management and the risks of installing unverified plugins. These steps go beyond generic advice by focusing on plugin-specific actions, privilege management, and proactive monitoring tailored to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-09-07T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec904
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 2:11:35 PM
Last updated: 8/1/2025, 9:57:56 AM
Views: 13
Related Threats
CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.