SQL Injection Vulnerability in WordPress Auction Plugin
CVE-2024-8855

9.8CRITICAL

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
7 January 2025

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

The WordPress Auction Plugin, up to version 3.7, is susceptible to SQL injection due to inadequate sanitization and escaping of parameters prior to their use in SQL statements. This flaw allows users with editor-level privileges and above to manipulate SQL queries, potentially leading to unauthorized access to sensitive data or the execution of arbitrary SQL commands. It is crucial for users to monitor their installations and apply security best practices to mitigate the risks associated with this vulnerability.

Affected Version(s)

WordPress Auction Plugin 0 <= 3.7

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Thanh Kieu
WPScan
.