Description
WordPress is prone to a possible SQL injection vulnerability because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. WordPress versions 4.8.x ranging from 4.8 and up to (and including) 4.8.2 are vulnerable.
Remediation
Update to WordPress version 4.8.3 or latest, and update any plugins that override $wpdb
References
https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-background.html
http://blog.vulspy.com/2017/11/09/Wordpress-4-8-2-SQL-Injection-POC/
https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/
Related Vulnerabilities
Joomla! Core 1.0.x Cross-Site Scripting (1.0.0 - 1.0.15)
Oracle JRE CVE-2013-2394 Vulnerability (CVE-2013-2394)
MySQL CVE-2021-35621 Vulnerability (CVE-2021-35621)
Oracle JRE CVE-2013-2473 Vulnerability (CVE-2013-2473)
WordPress Plugin WP Maps-Display Google Maps Perfectly with Ease Cross-Site Request Forgery (4.4.2)