CVE-2024-35750
Wpdevart
CVE-2024-35750 is a critical SQL Injection vulnerability found in the wpdevart Responsive Image Gallery and Gallery Album plugin, affecting versions up to 2.0.3. This flaw allows attackers to inject malicious SQL code, potentially leading to unauthorized data access, modification, or deletion. While the CVSS score is 8.8, the SOCRadar Vulnerability Risk Score (SVRS) is 30. The low SVRS suggests that, despite the high CVSS, this vulnerability might not be actively exploited or pose an immediate widespread threat at this time. However, given the presence of the In The Wild tag, organizations using the affected plugin should still investigate the vulnerability promptly and apply available patches to mitigate potential risks. The potential for complete database compromise makes addressing CVE-2024-35750 a crucial security measure.
Description
CVE-2024-35750 is an SQL Injection vulnerability in wpdevart Responsive Image Gallery, Gallery Album versions n/a through 2.0.3. This vulnerability allows attackers to execute arbitrary SQL commands on the vulnerable system, potentially leading to data theft, unauthorized access, or system compromise. The CVSS score of 8.5 indicates a high severity, while the SVRS of 34 suggests a moderate risk.
Key Insights
- Exploit Status: Active exploits have been published, indicating that attackers are actively exploiting this vulnerability.
- CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of this vulnerability, calling for immediate and necessary measures.
- Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
- In the Wild: The vulnerability is actively exploited by hackers, posing a significant threat to organizations using the affected software.
Mitigation Strategies
- Update Software: Install the latest security updates from wpdevart to patch the vulnerability.
- Use Input Validation: Implement robust input validation mechanisms to prevent malicious SQL queries from being executed.
- Use a Web Application Firewall (WAF): Deploy a WAF to block malicious traffic and protect against SQL injection attacks.
- Monitor for Suspicious Activity: Regularly monitor logs and security alerts for any suspicious activity that may indicate an SQL injection attack.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.