CVE-2024-4845
Icegram
CVE-2024-4845 is a critical SQL Injection vulnerability found in the Icegram Express WordPress plugin, affecting versions 5.7.22 and earlier. This vulnerability allows authenticated attackers with Subscriber-level access or higher to inject malicious SQL queries. Due to insufficient data sanitization, attackers can extract sensitive data from the WordPress database. With an SVRS of 30, while not immediately critical, this vulnerability should be addressed to prevent potential exploitation. The risk includes unauthorized access to sensitive information, potentially leading to data breaches and compromised website security. Addressing this vulnerability is essential for maintaining data integrity and preventing malicious activities.
Description:
CVE-2024-4845 is a SQL Injection vulnerability in the Icegram Express plugin for WordPress. It allows authenticated attackers with Subscriber-level access or higher to execute arbitrary SQL queries on the database, potentially leading to sensitive information disclosure.
Key Insights:
- High Severity: The CVSS score of 8.8 indicates a high severity vulnerability, requiring immediate attention.
- SVRS Score: The SOCRadar Vulnerability Risk Score (SVRS) of 38 suggests a moderate risk, indicating that the vulnerability is not as critical as others with higher SVRS scores.
- Exploitation: Active exploits have been published, making it likely that attackers are actively exploiting the vulnerability.
Mitigation Strategies:
- Update the Icegram Express plugin to version 5.7.23 or later.
- Implement input validation and sanitization to prevent malicious SQL queries from being executed.
- Regularly monitor logs for suspicious activity and investigate any unauthorized database access attempts.
- Consider using a web application firewall (WAF) to block malicious requests.
Additional Information:
- Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
- CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
- In the Wild: There is no evidence that this vulnerability is being actively exploited in the wild.
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.