<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Survey &amp; Poll Plugin — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/survey--poll-plugin/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 10 May 2026 13:21:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/survey--poll-plugin/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2021-47941: WordPress Survey &amp; Poll Plugin SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47941-wordpress-sqli/</link><pubDate>Sun, 10 May 2026 13:21:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47941-wordpress-sqli/</guid><description>WordPress Plugin Survey &amp; Poll version 1.5.7.3 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the wp_sap cookie parameter, potentially leading to sensitive data extraction.</description><content:encoded><![CDATA[<p>CVE-2021-47941 describes a critical SQL injection vulnerability affecting the WordPress Survey &amp; Poll plugin, version 1.5.7.3. This flaw allows unauthenticated attackers to inject malicious SQL code via the <code>wp_sap</code> cookie. By crafting specific SQL payloads within this cookie, attackers can execute arbitrary queries against the WordPress database. This can lead to the exfiltration of sensitive information such as usernames, passwords, and other confidential data stored within the database. The vulnerability poses a significant risk to WordPress websites using the affected plugin version, potentially leading to complete compromise of the web application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress website running the Survey &amp; Poll plugin version 1.5.7.3.</li>
<li>The attacker crafts a malicious SQL payload designed to extract sensitive data.</li>
<li>The attacker injects the SQL payload into the <code>wp_sap</code> cookie value within an HTTP request.</li>
<li>The WordPress application processes the request, executing the injected SQL query against the database.</li>
<li>The database server executes the malicious SQL query due to the SQL injection vulnerability in the plugin&rsquo;s handling of the <code>wp_sap</code> cookie.</li>
<li>The attacker retrieves the results of the SQL query, which may include usernames, passwords, or other sensitive data.</li>
<li>The attacker uses the exfiltrated data for further malicious activities, such as gaining administrative access to the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2021-47941 can allow an unauthenticated attacker to extract sensitive information from the WordPress database, including usernames, passwords, and potentially other confidential data. This can lead to complete compromise of the WordPress site, allowing the attacker to modify content, install malware, or use the site for further attacks. Due to the nature of the vulnerability, a wide range of WordPress sites using the vulnerable plugin version are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect CVE-2021-47941 Exploitation via Malicious wp_sap Cookie</code> to identify exploitation attempts based on SQL injection patterns in the <code>wp_sap</code> cookie value.</li>
<li>Deploy the Sigma rule <code>Detect WordPress wp_sap Cookie with Union SQL Injection</code> to detect UNION-based SQL injection attempts via the vulnerable cookie.</li>
<li>Upgrade the WordPress Survey &amp; Poll plugin to a patched version that addresses the SQL injection vulnerability (CVE-2021-47941).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cve</category><category>cve-2021-47941</category><category>wordpress</category><category>sql injection</category><category>web application</category></item></channel></rss>