SQL Injection Vulnerability in Track Logins Plugin for WordPress
CVE-2024-13608
Key Information:
- Vendor
- WordPress
- Status
- Vendor
- CVE Published:
- 17 February 2025
Badges
Summary
The Track Logins plugin for WordPress, up to version 1.0, is susceptible to SQL injection due to inadequate sanitization and escaping of a user-supplied parameter prior to its use in SQL statements. This oversight enables attackers, including malicious admins, to craft SQL queries that may compromise the database's integrity, exfiltrating sensitive information or manipulating the data. It is crucial for administrators utilizing this plugin to update to a patched version to mitigate potential security risks.
Affected Version(s)
Track Logins 0 <= 1.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved