Quick Review about the SQL-Injection in the NEX-Forms Plugin for WordPress# nex-forms_SQL-Injection CVE-2023-2114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2114
https://wpscan.com/vulnerability/3d8ab3a5-1bf8-4216-91fa-e89541e5c43d
Quick Review about the SQL-Injection in the NEX-Forms Plugin for WordPress
## Uploaded exploit
Note that this uploaded exploit code isnt for this particular vulnerability... But this is an example how you could make an exploit for this issue.
## Vulnerable Versions
From Version 8.3 (Maybe earlier too) till version 8.4
## The SQL-Injection itself
The SQL-Injection is placed in the authenticated area from NEX-Forms. When you edit a form and want to safe it, your client sends a post-request to the server with some parameters.
One of those parameters is called 'table' which is vulnerable. There was no sanitizing or filtering.
## Screenshots




[4.0K] /data/pocs/fc881a90ea288c438d37d2d02a962cb350feba60
├── [4.0K] js_sql_enum
│ ├── [3.0K] check_password.html
│ └── [5.5K] javascript_sql_enum.html
└── [1.3K] README.md
1 directory, 3 files