| Version | Supported |
|---|---|
| 1.5.x | ✅ |
This plugin is a security-hardened fork specifically designed to mitigate CVE-2021-21311 (SSRF vulnerability). The following security measures are in place:
- CVE-2021-21311 (SSRF - Critical)
- Status: FIXED
- Description: Server-Side Request Forgery allowing attackers to scan internal networks
- Fix: Removed ability to specify database server; hardcoded connection to WordPress database only
-
XSS Prevention
- All user-facing output is properly escaped using
esc_html()andesc_url() - Security headers added: X-Content-Type-Options, X-XSS-Protection, Referrer-Policy
- All user-facing output is properly escaped using
-
Path Traversal Protection
- File paths are validated using
realpath()to prevent directory traversal attacks
- File paths are validated using
-
Authentication & Authorization
- Strict capability checks:
manage_optionsrequired (admin-only access) - Authentication re-verified on every request
- Auto-login only works with WordPress session credentials
- Strict capability checks:
-
Direct File Access Protection
.htaccessfiles block direct access to.inc.phpand helper files- Only
index.phpentry point is accessible
-
Database Access Restriction
- Access limited to WordPress database only (no cross-database queries)
- Database credentials hardcoded from
wp-config.php
Important: This plugin uses Adminer version 4.2.4 (released in 2015). While the critical SSRF vulnerability (CVE-2021-21311) has been patched in this fork, other vulnerabilities may exist in the underlying Adminer core:
- CVE-2021-43008: Potential XSS vulnerabilities in Adminer <= 4.8.0
- CVE-2020-35572: File disclosure vulnerability in Adminer < 4.7.9
Why the old version is still used:
- The security model of this fork (localhost-only, admin-only access) significantly reduces the attack surface
- Upgrading Adminer core requires extensive testing to ensure compatibility with the security patches
- The benefit of newer Adminer features is outweighed by the risk of breaking existing security controls
Recommendation:
- Only use this plugin on trusted, private WordPress installations
- Consider this plugin for development and staging environments only
- For production environments, consider using phpMyAdmin or direct database access tools instead
When using this plugin:
- Access Control: Only grant
manage_optionscapability to trusted administrators - Network Security: Use HTTPS for all admin panel access
- Environment: Prefer using this tool in development/staging rather than production
- Monitoring: Monitor database access logs for suspicious activity
- Updates: Keep WordPress core and this plugin up to date
If you discover a security vulnerability in SudoWP Adminer, please report it by:
- Do NOT open a public issue
- Email the maintainers at the contact information in the plugin header
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
We will respond within 48 hours and work to address confirmed vulnerabilities as quickly as possible.
- Original Adminer by Jakub Vrana
- CVE-2021-21311 disclosure and patch contributors
- WordPress security team for best practices guidance