Description
WordPress is prone to a possible SQL injection vulnerability because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. WordPress versions 4.1.x ranging from 4.1 and up to (and including) 4.1.19 are vulnerable.
Remediation
Update to WordPress version 4.1.20 or latest, and update any plugins that override $wpdb
References
https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-background.html
http://blog.vulspy.com/2017/11/09/Wordpress-4-8-2-SQL-Injection-POC/
Related Vulnerabilities
Moodle Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2008-5153)
GlassFish CVE-2017-10393 Vulnerability (CVE-2017-10393)
WordPress Plugin Xerte Online 'save.php' Arbitrary File Upload (0.32)
WordPress Plugin Easy Watermark Security Bypass (0.7.0)
Tornado Observable Differences in Behavior to Error Inputs Vulnerability (CVE-2014-9720)