Skip to main content

CVE-2023-6030: CWE-89 SQL Injection in Unknown LogDash Activity Log

Medium
VulnerabilityCVE-2023-6030cvecve-2023-6030cwe-89
Published: Thu May 15 2025 (05/15/2025, 20:09:05 UTC)
Source: CVE
Vendor/Project: Unknown
Product: LogDash Activity Log

Description

The LogDash Activity Log WordPress plugin before 1.1.4 hooks the wp_login_failed function (from src/Hooks/Users.php) in order to log failed login attempts to the database but it doesn't escape the username when it perform some SQL request leading to a SQL injection vulnerability which can be exploited using time-based technique by unauthenticated attacker

AI-Powered Analysis

AILast updated: 07/04/2025, 16:27:03 UTC

Technical Analysis

CVE-2023-6030 is a medium-severity SQL Injection vulnerability affecting the LogDash Activity Log WordPress plugin versions prior to 1.1.4. The vulnerability arises because the plugin hooks into the wp_login_failed function to log failed login attempts but fails to properly sanitize or escape the username parameter before including it in SQL queries. This improper handling allows an unauthenticated attacker to perform a time-based blind SQL injection attack by injecting malicious SQL payloads into the username field during failed login attempts. Exploiting this vulnerability could enable the attacker to extract sensitive information from the WordPress database, such as user credentials or other stored data, by observing response delays caused by the time-based technique. The vulnerability does not require authentication or user interaction, increasing its risk profile. However, the CVSS score of 5.4 (medium) reflects that the impact on confidentiality and integrity is limited, and availability is not affected. The vulnerability is specific to the LogDash Activity Log plugin, which is not a default WordPress component but an add-on that logs user activity. No known exploits are currently reported in the wild, and no official patches or updates have been linked yet, indicating that users should be vigilant and consider mitigation steps proactively.

Potential Impact

For European organizations using WordPress websites with the LogDash Activity Log plugin, this vulnerability poses a tangible risk of data leakage and unauthorized database access. Attackers could leverage this flaw to extract sensitive user information or internal data, potentially leading to privacy violations under GDPR regulations. The ability to exploit the vulnerability without authentication means that any exposed WordPress site with the vulnerable plugin is at risk from external attackers. This could result in reputational damage, regulatory fines, and operational disruptions if sensitive data is compromised. Additionally, attackers might use the extracted information as a foothold for further attacks, such as privilege escalation or lateral movement within the organization's infrastructure. Given the widespread use of WordPress in Europe for business and governmental websites, the vulnerability could affect a broad range of sectors, including e-commerce, public services, and media.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the LogDash Activity Log plugin and verify the version in use. If the plugin is installed and is a version prior to 1.1.4, organizations should disable or remove the plugin until a secure update is available. In the absence of an official patch, organizations can implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the username parameter in login requests. Additionally, monitoring failed login attempts for unusual patterns or spikes can help detect exploitation attempts. Organizations should also ensure that their WordPress core, themes, and plugins are regularly updated and that database user permissions follow the principle of least privilege to limit the impact of any successful injection. Finally, consider implementing input validation and escaping mechanisms at the application level if custom code interacts with the plugin or login processes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-11-08T12:00:14.030Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebab8

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/4/2025, 4:27:03 PM

Last updated: 7/28/2025, 7:09:29 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats