CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
2DescriptionNVD
The B1.lt plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 2.2.56 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AnalysisAI
SQL Injection in B1.lt WordPress plugin up to version 2.2.56 allows authenticated attackers with Subscriber-level access to extract sensitive database information via an unescaped 'id' parameter. The vulnerability requires valid user credentials and network access but involves minimal interaction, making it a moderate risk for WordPress installations with many trusted users. No public exploit code or active exploitation has been confirmed.
Technical ContextAI
The B1.lt plugin (also marketed as B1 Accounting) fails to properly escape and prepare SQL queries for user-supplied input in the 'id' parameter. This is a classic SQL Injection vulnerability (CWE-89) where insufficient input validation and lack of prepared statement usage allow attackers to manipulate SQL query logic. Authenticated users at Subscriber level or above can append arbitrary SQL commands to extract unauthorized data from the WordPress database. The vulnerability affects the plugin's query handling mechanism where dynamic SQL construction occurs without adequate parameterization or escaping functions.
Affected ProductsAI
The B1.lt plugin (also known as B1 Accounting plugin for WordPress) is affected in all versions up to and including 2.2.56. The plugin is hosted on the official WordPress Plugin Repository at wordpress.org/plugins/b1-accounting/. Users running versions 2.2.56 or earlier are vulnerable; version information for patched releases was not independently confirmed from the provided references.
RemediationAI
Update the B1.lt plugin to the latest available version beyond 2.2.56 from the WordPress Plugin Repository. The patch reference indicates a changeset was made to the plugin repository (visible at the provided Trac URL), suggesting a patched version is available. Site administrators should immediately update the plugin through the WordPress admin dashboard. As an interim mitigation for sites unable to update immediately, restrict Subscriber-level user accounts or temporarily deactivate the plugin if it is not critical to operations. For additional details and confirmation of the patched version, consult the Wordfence vulnerability advisory at the provided reference URL.
Share
External POC / Exploit Code
Leaving vuln.today