CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-33544

Medium Severity
SVRS
36/100

CVSSv3
NA/10

EPSS
0.00583/1

CVE-2024-33544: SQL Injection vulnerability in AA-Team WZone plugin impacts versions up to 14.0.10. This security flaw allows attackers to inject malicious SQL code, potentially leading to unauthorized data access or modification. Despite a CVSS score of 0, CVE-2024-33544 poses a risk due to active exploits being available. The SVRS score of 36 suggests a moderate level of concern, indicating that while not critical, the presence of active exploits warrants careful monitoring and mitigation. An unauthenticated attacker could leverage this flaw to extract sensitive information from the database. Organizations using the affected WZone plugin should promptly apply available patches or mitigations. The vulnerability stems from improper neutralization of special elements in an SQL command (CWE-89). Due to the presence of active exploits, the risk is elevated.

In The Wild
Exploit Avaliable
2024-04-29

2024-04-29
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-33544 is an SQL Injection vulnerability in AA-Team WZone that allows attackers to execute arbitrary SQL commands on the vulnerable system. This vulnerability affects WZone versions from n/a through 14.0.10. The CVSS score of 9.3 indicates the high severity of this vulnerability, while the SVRS of 30 suggests a moderate level of risk.

Key Insights

  • Exploitation: Active exploits for this vulnerability have been published, making it a high-priority target for attackers.
  • Threat Actors: This vulnerability is actively exploited by threat actors, including APT groups.
  • CISA Warning: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of this vulnerability, calling for immediate and necessary measures.
  • In the Wild: This vulnerability is actively exploited by hackers in the wild.

Mitigation Strategies

  • Update Software: Update WZone to version 14.0.11 or later to patch this vulnerability.
  • Use Input Validation: Implement input validation techniques to prevent attackers from submitting malicious SQL commands.
  • Use a Web Application Firewall (WAF): Deploy a WAF to block malicious traffic and protect against SQL injection attacks.
  • Monitor for Suspicious Activity: Monitor logs and network traffic for any suspicious activity that may indicate an SQL injection attack.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

TitleSoftware LinkDate
codeb0ss/CVE-2024-33544-PoChttps://github.com/codeb0ss/CVE-2024-33544-PoC2024-07-17
Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Multiple Vulnerabilities in WooCommerce Amazon Affiliates Plugin
Rafie Muhammad2024-06-06
Multiple Vulnerabilities in WooCommerce Amazon Affiliates Plugin | This blog post is about WooCommerce Amazon Affiliates (WZone) plugin vulnerabilities. If you&#8217;re a WooCommerce Amazon Affiliates (WZone) user, please deactivate and delete the plugin since there is still no known patched version. All paid Patchstack users are protected from this vulnerability. Sign up for the free Community account first, to scan for vulnerabilities and [&#8230;] The post Multiple Vulnerabilities in WooCommerce Amazon Affiliates Plugin appeared first on <a href="https://
cve-2024-33544
cve-2024-33549
cve-2024-33546
domains

Social Media

CVE-2024-33544 (CVSS:9.3, CRITICAL) is Awaiting Analysis. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AA-Team WZone allo..https://t.co/T25tSliQBZ #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
0
0
0
CVE-2024-33544 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AA-Team WZone allows SQL Injection.This issue affects WZone: from n/a through 14.0.10. https://t.co/QiuOf6CLxj
0
0
0
CVE-2024-33544 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AA-Team WZone allows SQL Injection.This issue affects WZone: fro… https://t.co/FBnhxxQ00A
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://patchstack.com/database/vulnerability/woozone/wordpress-wzone-plugin-14-0-10-unauthenticated-sql-injection-vulnerability?_s_id=cve

CWE Details

CWE IDCWE NameDescription
CWE-89Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence