CVE-2024-8624
Pluginus
CVE-2024-8624: SQL Injection vulnerability in the WordPress MDTF Plugin. Authenticated contributors can exploit SQL injection in the 'meta_key' parameter of the 'mdf_select_title' shortcode. This flaw affects versions up to 1.3.3.3, allowing attackers to potentially extract sensitive data from the WordPress database. With an SVRS of 30, while not critical, this vulnerability still poses a risk. The absence of proper escaping and SQL query preparation makes the plugin susceptible to malicious SQL commands. Successful exploitation requires contributor-level access or higher, limiting the scope of potential attackers, but remains a significant threat to data security. Immediate patching is recommended.
Description:
CVE-2024-8624 is a SQL Injection vulnerability in the MDTF – Meta Data and Taxonomies Filter plugin for WordPress. It allows authenticated attackers with Contributor-level access or higher to execute arbitrary SQL queries on the database, potentially leading to sensitive information disclosure.
Key Insights:
- High Severity: The CVSS score of 9.9 indicates a critical vulnerability that requires immediate attention.
- SVRS of 34: While lower than the CVSS score, the SVRS of 34 still signifies a moderate risk, highlighting the need for prompt action.
- Active Exploitation: The vulnerability is actively exploited in the wild, making it imperative for organizations to patch their systems immediately.
Mitigation Strategies:
- Update WordPress: Install the latest version of WordPress (6.1.1) which includes a fix for this vulnerability.
- Disable the Plugin: If updating WordPress is not immediately possible, disable the MDTF plugin until a patch is available.
- Restrict Access: Limit access to the WordPress dashboard to only authorized users with the minimum necessary privileges.
- Implement Web Application Firewall (WAF): Configure a WAF to block malicious traffic and prevent SQL injection attacks.
Additional Information:
- Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
- Exploit Status: Active exploits have been published.
- CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of this vulnerability, calling for immediate and necessary measures.
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.