Possible Remote Code Execution Vulnerability in WP Crontrol Due to SQLi or Similar Vulnerability
CVE-2024-28850

8.2HIGH

Key Information:

Vendor

Wordpress

Vendor
CVE Published:
25 March 2024

What is CVE-2024-28850?

The WP Crontrol plugin, crucial for managing cron events in WordPress sites, has a potential vulnerability that can lead to remote code execution when combined with other existing vulnerabilities such as SQL injection. This situation arises when a site is susceptible to specific conditions, including writable SQL injection vulnerabilities within plugins, themes, or the WordPress core, compromised databases at the hosting level, or exploitation of methods that update arbitrary options in the wp_options table or invoke actions with controlled parameters. Versions preceding 1.16.2 of WP Crontrol are particularly at risk. To mitigate this issue, the latest update introduces a security feature that safeguards the PHP code stored within cron events from unauthorized alterations.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

wp-crontrol < 1.16.2

References

CVSS V3.1

Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.