SQL Injection Vulnerability in WP Data Access Plugin for WordPress
CVE-2024-12428

7.5HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
25 December 2024

Summary

The WP Data Access Plugin for WordPress has a vulnerability that enables SQL Injection through the 'order[user_login][dir]' parameter in all releases up to version 5.5.22. This arises from inadequate escaping of user-supplied data and a failure to properly prepare the existing SQL queries. An attacker without authentication can exploit this flaw to inject additional SQL commands into existing queries, potentially allowing them to access sensitive information within the database. Website administrators are advised to update to version 5.5.23 or above to mitigate this security risk.

Affected Version(s)

WP Data Access – App, Table, Form and Chart Builder plugin * <= 5.5.22

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Michael Mazzolini
.