| Key | Value |
|---|---|
| Date of Disclosure | February 29, 2024 |
| Affected Software | aweber-web-form-widget |
| Affected Software Type | WordPress plugin |
| Version | 7.3.14 |
| Weakness | SQL Injection |
| CWE ID | CWE-89 |
| CVE ID | CVE-2024-1793 |
| CVSS 3.x Base Score | 7.2 |
| CVSS 2.0 Base Score | - |
| Reporter | Kunal Sharma, Akshay Kumar |
| Reporter Contact | [email protected] |
| Link to Affected Software | https://wordpress.org/plugins/aweber-web-form-widget/ |
| Link to Vulnerability DB | https://nvd.nist.gov/vuln/detail/CVE-2024-1793 |
The post_id POST query parameter in aweber-web-form-widget 7.3.14 is vulnerable to SQL injection. An authenticated attacker may abuse the "Unlink the landing page" functionality in unLinklandingPagefunction function inside aweber_webform_plugin.php. This leads to a threat actor crafting a malicious POST request and causing an authenticated SQL injection.
Login as admin user. This vulnerability requires at least admin privileges.

Install and activate affected plugin: AWeber for WordPress.

Plugin AWeber for WordPress requires an active AWeber account (free tier can be used) to embed landing pages and sign-up forms on the WordPress site.

Click on Get Started to create an account/login to an existing account and paste the authorization code in the given text box and click Finish.


Click Landing Pages on the left sidebar.

Click on Create to create a new landing page.

Since this is a new AWeber account, there are no landing pages added yet. We have to add new landing page in the account used to authorize earlier. A sample landing page can be easily created using a default page on: https://www.aweber.com/users/landing_pages

Note: Publish the page once it’s created.
Select list from List drop down menu. Sample list is created automatically on account creation.

Landing page(s) created in *Step: 7* can be accessed by selecting the list.

Click Link.

Select a Sample Page and click Link this page.