SQL Injection Vulnerability in Melapress File Monitor WordPress Plugin
CVE-2024-10009

4.1MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
15 May 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2024-10009?

The Melapress File Monitor plugin for WordPress suffers from a vulnerability where it fails to properly sanitize and escape user-supplied data before integrating it into SQL statements. This flaw allows potential attackers, especially those with administrative access, to execute unauthorized SQL commands, leading to possible data breaches or manipulation. Site administrators are advised to update to version 2.1.0 or later to mitigate this risk.

Affected Version(s)

Melapress File Monitor 0 < 2.1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
4.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

y4ng0615
WPScan
.