Skip to main content

CVE-2022-3915: CWE-89 SQL Injection in Unknown Dokan

Critical
VulnerabilityCVE-2022-3915cvecve-2022-3915cwe-89-sql-injection
Published: Mon Dec 12 2022 (12/12/2022, 17:54:43 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Dokan

Description

The Dokan WordPress plugin before 3.7.6 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users

AI-Powered Analysis

AILast updated: 06/21/2025, 14:08:19 UTC

Technical Analysis

CVE-2022-3915 is a critical SQL injection vulnerability identified in the Dokan WordPress plugin, specifically affecting versions prior to 3.7.6, including version 2.6.8. Dokan is a popular multi-vendor marketplace plugin for WordPress, enabling users to create e-commerce platforms with multiple sellers. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input before incorporating it into SQL queries. This improper handling allows unauthenticated attackers to inject malicious SQL code directly into the backend database queries. Exploitation does not require any authentication or user interaction, making it highly accessible to remote attackers. The vulnerability impacts confidentiality, integrity, and availability of the affected systems, as attackers can extract sensitive data, modify or delete database records, or disrupt service availability. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with attack vector being network-based (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and full impact on confidentiality (C:H), integrity (I:H), and availability (A:H). Although no public exploits have been reported in the wild yet, the ease of exploitation and severity make it a high-risk threat for any WordPress site using vulnerable Dokan versions. Given the widespread use of WordPress and the popularity of Dokan for e-commerce marketplaces, this vulnerability poses a significant risk to online businesses relying on this plugin for their operations.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. Many SMEs and larger enterprises in Europe utilize WordPress-based e-commerce solutions, including Dokan, to run online marketplaces and retail platforms. Exploitation could lead to unauthorized access to customer data, including personal and payment information, violating GDPR and other data protection regulations, resulting in legal and financial penalties. Attackers could manipulate product listings, pricing, or order data, damaging business reputation and causing financial loss. Additionally, disruption of service availability could lead to loss of revenue and customer trust. The vulnerability's ability to be exploited remotely without authentication increases the risk of widespread attacks targeting European e-commerce infrastructure. Organizations in sectors such as retail, logistics, and digital services that rely on Dokan-powered marketplaces are particularly vulnerable. The critical severity and potential for data breaches make this a priority issue for cybersecurity teams in Europe.

Mitigation Recommendations

1. Immediate upgrade: Organizations should promptly update the Dokan plugin to version 3.7.6 or later, where this vulnerability is patched. 2. Web application firewall (WAF): Deploy and configure WAF rules to detect and block SQL injection attempts targeting Dokan plugin endpoints. 3. Input validation: Implement additional server-side input validation and sanitization for parameters used in SQL queries, especially if custom code interacts with Dokan. 4. Database monitoring: Enable database activity monitoring to detect unusual queries or data access patterns indicative of SQL injection exploitation. 5. Access restrictions: Limit public access to administrative or sensitive plugin endpoints where possible, using IP whitelisting or authentication layers. 6. Incident response readiness: Prepare for potential exploitation by ensuring backups are current and incident response plans include steps for SQL injection attacks. 7. Security scanning: Regularly scan WordPress installations with vulnerability scanners that detect outdated plugins and known vulnerabilities. These measures, combined with patching, will reduce the risk of exploitation and limit potential damage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-11-09T16:08:21.851Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf723f

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 2:08:19 PM

Last updated: 8/9/2025, 12:52:43 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats