$4,500 Bounty: SQL Injection in WordPress Plugin Leads to PII Exposure at Grab
Formidable Pro WordPress插件的AJAX预览功能存在SQL注入漏洞,允许未认证用户访问数据库并获取敏感数据,甚至可能引发远程代码执行风险。 2025-5-19 09:11:17 Author: infosecwriteups.com(查看原文) 阅读量:11 收藏

How a Plugin Preview Feature Exposed User Data and Nearly Enabled Admin Dashboard Pivoting

Monika sharma

In a bug report that earned a $4,500 bounty from Grab security researcher jouko uncovered a critical SQL Injection vulnerability in the Formidable Pro WordPress plugin used on www.drivegrab.com. This flaw gave unauthorized users read access to the WordPress database revealing sensitive partner data and nearly opened a path to Remote Code Execution (RCE).

Vulnerability Overview

The plugin’s AJAX preview function meant for administrators designing forms was mistakenly exposed to unauthenticated users. It accepted parameters like after_html that could include WordPress shortcodes including the plugin’s [display-frm-data] which could be manipulated to perform SQL Injection through parameters like order_by and order.

Proof of Concept (PoC)

Using cURL, the researcher was able to demonstrate:

curl -s -i 'https://www.drivegrab.com/wp-admin/admin-ajax.php' \
--data 'action=frm_forms_preview&after_html=XXX[display-frm-data id=835 order_by=id limit=1 order=zzz]YYY'

文章来源: https://infosecwriteups.com/4-500-bounty-sql-injection-in-wordpress-plugin-leads-to-pii-exposure-at-grab-7c26aa7beff6?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh