SQL Injection Vulnerability in KiviCare Plugin for WordPress
CVE-2024-11728
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 6 December 2024
Badges
What is CVE-2024-11728?
CVE-2024-11728 is a vulnerability found in the KiviCare Clinic & Patient Management System, a plugin designed for WordPress that facilitates the management of healthcare services. This particular vulnerability allows unauthenticated attackers to exploit an SQL injection flaw through the 'visit_type[service_id]' parameter. If successfully exploited, this can lead to unauthorized access to sensitive patient and operational data stored within the system, jeopardizing the confidentiality and integrity of healthcare information and potentially affecting patient trust and care delivery.
Technical Details
The exploitation stems from insufficient escaping of user-supplied parameters and inadequate preparation of SQL queries, which leaves the system vulnerable to injection attacks. It specifically impacts all versions leading up to and including 3.6.4 of the KiviCare plugin. Attackers can inject malicious SQL code into existing queries, allowing them to manipulate the database and extract sensitive information without needing authentication.
Impact of the Vulnerability
-
Data Breaches: Unauthorized access to sensitive patient information can lead to significant data breaches, compromising patient privacy and possibly resulting in regulatory penalties for non-compliance with data protection laws.
-
System Integrity Threats: The potential to execute arbitrary SQL queries can disrupt system functionality, leading to unauthorized modifications or deletions of critical data, which may impact healthcare delivery and operations.
-
Reputation Damage: Exploitation of this vulnerability may result in a loss of trust from patients and partners, damaging the organization’s reputation and potentially leading to loss of business or legal repercussions.
Affected Version(s)
KiviCare – Clinic & Patient Management System (EHR) * <= 3.6.4
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved