CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-1512

Medium Severity
Stylemixthemes
SVRS
30/100

CVSSv3
NA/10

EPSS
0.9376/1

CVE-2024-1512: SQL Injection vulnerability in MasterStudy LMS WordPress Plugin. This plugin, used for online courses, allows unauthenticated attackers to extract sensitive data due to insufficient input sanitization in the /lms/stm-lms/order/items REST route. Specifically, the 'user' parameter is vulnerable to union-based SQL injection attacks.

This vulnerability affects versions up to and including 3.2.5. Although the SVRS score is 30 indicating a medium risk, the active exploits and "In The Wild" tag highlight the immediate danger, as attackers are actively leveraging this flaw. Successful exploitation allows unauthorized access to the database and the potential theft of critical information, underscoring the need for prompt patching despite the moderate SVRS. Address this SQL injection issue to prevent potential data breaches and maintain the integrity of your WordPress site.

In The Wild
Exploit Avaliable
2024-02-17

2024-12-18
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-1512 is a union-based SQL injection vulnerability in the MasterStudy LMS WordPress Plugin. It allows unauthenticated attackers to append additional SQL queries to existing ones, potentially extracting sensitive information from the database.

Key Insights:

  • High Severity: The CVSS score of 9.8 indicates a critical vulnerability requiring immediate attention.
  • SVRS Score: The SVRS score of 30 suggests a moderate risk, indicating that the vulnerability is not as severe as others with higher scores.
  • Exploit Status: Active exploits have been published, making it crucial for organizations to patch their systems promptly.

Mitigation Strategies:

  • Update the MasterStudy LMS WordPress Plugin to version 3.2.6 or later.
  • Implement input validation and sanitization to prevent malicious SQL queries.
  • Use a web application firewall (WAF) to block malicious requests.
  • Regularly monitor logs for suspicious activity and take appropriate action.

Additional Information:

  • Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
  • In the Wild: There is no evidence that this vulnerability is actively exploited in the wild.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

TitleSoftware LinkDate
nomi-sec/PoC-in-GitHubhttps://github.com/nomi-sec/PoC-in-GitHub2019-12-08
rat-c/CVE-2024-1512https://github.com/rat-c/CVE-2024-15122024-03-01
Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-1512 | MasterStudy LMS WordPress Plugin up to 3.2.5 on WordPress sql injection (ID 3036794)
vuldb.com2024-12-18
CVE-2024-1512 | MasterStudy LMS WordPress Plugin up to 3.2.5 on WordPress sql injection (ID 3036794) | A vulnerability has been found in MasterStudy LMS WordPress Plugin up to 3.2.5 on WordPress and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection. This vulnerability is known as CVE-2024-1512. Access to the local network is required for this attack to succeed. There
vuldb.com
rss
forum
news

Social Media

No tweets found for this CVE

Affected Software

Configuration 1
TypeVendorProduct
AppStylemixthemesmasterstudy_lms

References

ReferenceLink
[email protected]https://plugins.trac.wordpress.org/changeset/3036794/masterstudy-lms-learning-management-system/trunk/_core/lms/classes/models/StmStatistics.php
[email protected]https://www.wordfence.com/threat-intel/vulnerabilities/id/d6b6d824-51d3-4da9-a39a-b957368df4dc?source=cve
AF854A3A-2127-422B-91AE-364DA2661108https://plugins.trac.wordpress.org/changeset/3036794/masterstudy-lms-learning-management-system/trunk/_core/lms/classes/models/StmStatistics.php
AF854A3A-2127-422B-91AE-364DA2661108https://www.wordfence.com/threat-intel/vulnerabilities/id/d6b6d824-51d3-4da9-a39a-b957368df4dc?source=cve
[email protected]https://plugins.trac.wordpress.org/changeset/3036794/masterstudy-lms-learning-management-system/trunk/_core/lms/classes/models/StmStatistics.php
[email protected]https://www.wordfence.com/threat-intel/vulnerabilities/id/d6b6d824-51d3-4da9-a39a-b957368df4dc?source=cve

CWE Details

CWE IDCWE NameDescription
CWE-89Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence