SQL Injection Vulnerability in Tutor LMS Plugin for WordPress Could Leak Sensitive Data
CVE-2024-10400
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 21 November 2024
Badges
What is CVE-2024-10400?
CVE-2024-10400 is a SQL Injection vulnerability affecting the Tutor LMS plugin for WordPress, developed by Themeum. This vulnerability arises from insufficient input sanitization and improper handling of user-supplied parameters in SQL queries within all versions up to and including 2.7.6. If exploited, this flaw can allow unauthenticated attackers to manipulate database queries, potentially leading to the exposure of sensitive data within an organization. The impact of such unauthorized access can be particularly detrimental, as it may result in data breaches, loss of user trust, and compliance violations.
Technical Details
The vulnerability specifically targets the 'rating_filter' parameter, enabling attackers to inject additional SQL commands into existing queries. This occurs due to inadequate escaping of user inputs, causing the database to execute malicious statements. Attackers can leverage this vulnerability to gain unauthorized access to sensitive information stored in the database, including user credentials, personal data, and other confidential information. Exploiting this vulnerability does not require authentication, making it easily accessible to potential attackers.
Potential impact of CVE-2024-10400
-
Data Leakage: Unauthenticated attackers can extract sensitive information from the database, leading to significant data breaches that can compromise user privacy and organizational confidentiality.
-
Regulatory Consequences: Organizations that fail to protect sensitive data may face legal and regulatory repercussions, including fines and damage to their reputation, especially if the data breach involves personally identifiable information (PII).
-
Loss of Trust: Breaches resulting from this vulnerability can erode customer trust and damage an organization's reputation, leading to a decline in user engagement and potential loss of business.
Affected Version(s)
Tutor LMS β eLearning and online course solution * <= 2.7.6
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved