CVE-2023-2655: CWE-89 SQL Injection in Unknown Contact Form by WD
The Contact Form by WD WordPress plugin through 1.13.23 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
AI Analysis
Technical Summary
CVE-2023-2655 is a high-severity SQL Injection vulnerability affecting the WordPress plugin 'Contact Form by WD' up to version 1.13.23. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input before incorporating it into SQL queries. Specifically, a parameter processed by the plugin is directly used in a SQL statement without adequate validation or escaping, which allows an attacker with high privileges—such as an administrator—to inject malicious SQL code. This can lead to unauthorized data access, modification, or deletion within the underlying database. The vulnerability requires no user interaction but does require the attacker to have high-level privileges, which limits exploitation to users who already have significant access to the WordPress environment. The CVSS v3.1 score of 7.2 reflects a high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction needed. Although no public exploits are currently known in the wild, the vulnerability poses a significant risk due to the sensitive nature of SQL injection flaws and the potential for privilege escalation or data compromise. The plugin is widely used in WordPress sites for contact form functionality, making affected installations potentially vulnerable until patched or mitigated.
Potential Impact
For European organizations using WordPress sites with the Contact Form by WD plugin, this vulnerability could lead to serious data breaches, including exposure or alteration of sensitive customer or business data stored in the database. Since the exploit requires high privilege access, the primary risk is from insider threats or compromised administrator accounts. Successful exploitation could allow attackers to manipulate database contents, disrupt website operations, or pivot to further attacks within the network. This could result in reputational damage, regulatory penalties under GDPR for data breaches, and operational downtime. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, are particularly at risk. Moreover, the widespread use of WordPress in Europe means many SMEs and larger enterprises could be affected if they have not updated or mitigated this vulnerability.
Mitigation Recommendations
1. Immediate patching: Organizations should update the Contact Form by WD plugin to the latest version once a patch is released. In the absence of an official patch, consider temporarily disabling the plugin or replacing it with an alternative contact form solution. 2. Privilege management: Restrict administrative privileges strictly to trusted users and implement multi-factor authentication (MFA) to reduce the risk of credential compromise. 3. Input validation: Implement additional web application firewall (WAF) rules to detect and block suspicious SQL injection attempts targeting the plugin’s endpoints. 4. Database permissions: Limit database user permissions associated with the WordPress application to the minimum necessary to reduce the impact of SQL injection. 5. Monitoring and logging: Enable detailed logging of database queries and WordPress admin activities to detect anomalous behavior indicative of exploitation attempts. 6. Security audits: Conduct regular vulnerability scans and penetration tests focusing on WordPress plugins and custom code to identify similar injection flaws.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2023-2655: CWE-89 SQL Injection in Unknown Contact Form by WD
Description
The Contact Form by WD WordPress plugin through 1.13.23 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
AI-Powered Analysis
Technical Analysis
CVE-2023-2655 is a high-severity SQL Injection vulnerability affecting the WordPress plugin 'Contact Form by WD' up to version 1.13.23. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input before incorporating it into SQL queries. Specifically, a parameter processed by the plugin is directly used in a SQL statement without adequate validation or escaping, which allows an attacker with high privileges—such as an administrator—to inject malicious SQL code. This can lead to unauthorized data access, modification, or deletion within the underlying database. The vulnerability requires no user interaction but does require the attacker to have high-level privileges, which limits exploitation to users who already have significant access to the WordPress environment. The CVSS v3.1 score of 7.2 reflects a high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction needed. Although no public exploits are currently known in the wild, the vulnerability poses a significant risk due to the sensitive nature of SQL injection flaws and the potential for privilege escalation or data compromise. The plugin is widely used in WordPress sites for contact form functionality, making affected installations potentially vulnerable until patched or mitigated.
Potential Impact
For European organizations using WordPress sites with the Contact Form by WD plugin, this vulnerability could lead to serious data breaches, including exposure or alteration of sensitive customer or business data stored in the database. Since the exploit requires high privilege access, the primary risk is from insider threats or compromised administrator accounts. Successful exploitation could allow attackers to manipulate database contents, disrupt website operations, or pivot to further attacks within the network. This could result in reputational damage, regulatory penalties under GDPR for data breaches, and operational downtime. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, are particularly at risk. Moreover, the widespread use of WordPress in Europe means many SMEs and larger enterprises could be affected if they have not updated or mitigated this vulnerability.
Mitigation Recommendations
1. Immediate patching: Organizations should update the Contact Form by WD plugin to the latest version once a patch is released. In the absence of an official patch, consider temporarily disabling the plugin or replacing it with an alternative contact form solution. 2. Privilege management: Restrict administrative privileges strictly to trusted users and implement multi-factor authentication (MFA) to reduce the risk of credential compromise. 3. Input validation: Implement additional web application firewall (WAF) rules to detect and block suspicious SQL injection attempts targeting the plugin’s endpoints. 4. Database permissions: Limit database user permissions associated with the WordPress application to the minimum necessary to reduce the impact of SQL injection. 5. Monitoring and logging: Enable detailed logging of database queries and WordPress admin activities to detect anomalous behavior indicative of exploitation attempts. 6. Security audits: Conduct regular vulnerability scans and penetration tests focusing on WordPress plugins and custom code to identify similar injection flaws.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-05-11T12:32:48.856Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683dc31f182aa0cae24a04ec
Added to database: 6/2/2025, 3:28:31 PM
Last enriched: 7/3/2025, 4:26:43 PM
Last updated: 8/11/2025, 7:59:40 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.