SQL Injection Vulnerability in The Action Network WordPress Plugin
CVE-2024-2954
7.2HIGH
Summary
The Action Network plugin for WordPress has a vulnerability that allows authenticated users with administrator-level access to perform SQL Injection through the 'bulk-action' parameter in version 1.4.3. This flaw is caused by inadequate escaping of user-supplied input and a lack of proper preparation in the SQL queries. As a result, attackers can insert malicious SQL commands into existing queries, potentially revealing sensitive data stored in the database. Organizations using this plugin should take immediate measures to patch the affected version and ensure robust security practices to protect against such vulnerabilities.
Affected Version(s)
Action Network 1.4.3
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Pichaya Morimoto
Nanchanan Sanapun