SQL Injection Vulnerability in KiviCare Plugin for WordPress
CVE-2024-11728

7.5HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
6 December 2024

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2024-11728?

CVE-2024-11728 is a vulnerability found in the KiviCare Clinic & Patient Management System, a plugin designed for WordPress that facilitates the management of healthcare services. This particular vulnerability allows unauthenticated attackers to exploit an SQL injection flaw through the 'visit_type[service_id]' parameter. If successfully exploited, this can lead to unauthorized access to sensitive patient and operational data stored within the system, jeopardizing the confidentiality and integrity of healthcare information and potentially affecting patient trust and care delivery.

Technical Details

The exploitation stems from insufficient escaping of user-supplied parameters and inadequate preparation of SQL queries, which leaves the system vulnerable to injection attacks. It specifically impacts all versions leading up to and including 3.6.4 of the KiviCare plugin. Attackers can inject malicious SQL code into existing queries, allowing them to manipulate the database and extract sensitive information without needing authentication.

Impact of the Vulnerability

  1. Data Breaches: Unauthorized access to sensitive patient information can lead to significant data breaches, compromising patient privacy and possibly resulting in regulatory penalties for non-compliance with data protection laws.

  2. System Integrity Threats: The potential to execute arbitrary SQL queries can disrupt system functionality, leading to unauthorized modifications or deletions of critical data, which may impact healthcare delivery and operations.

  3. Reputation Damage: Exploitation of this vulnerability may result in a loss of trust from patients and partners, damaging the organization’s reputation and potentially leading to loss of business or legal repercussions.

Affected Version(s)

KiviCare – Clinic & Patient Management System (EHR) * <= 3.6.4

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Khayal Farzaliyev
.