Cyber Posture

CVE-2024-12416

High

Published: 07 January 2025

Published
07 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0052 66.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

The Live Sales Notification for Woocommerce – Woomotiv plugin for WordPress is vulnerable to SQL Injection via the 'woomotiv_seen_products_.*' cookie in all versions up to, and including, 3.6.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Security Summary

CVE-2024-12416 is a SQL injection vulnerability (CWE-89) in the Live Sales Notification for WooCommerce – Woomotiv plugin for WordPress, affecting all versions up to and including 3.6.1. The issue arises from insufficient escaping of the user-supplied parameter in the 'woomotiv_seen_products_.*' cookie and lack of sufficient preparation on the existing SQL query, allowing injection into database operations.

Unauthenticated attackers can exploit this vulnerability over the network with low attack complexity and no user interaction or privileges required, as reflected in its CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). Exploitation enables appending additional SQL queries to existing ones, resulting in the extraction of sensitive information from the database without impacting integrity or availability.

Mitigation details are provided in advisories including the WordPress plugin trac changeset at https://plugins.trac.wordpress.org/changeset/3237395/ and Wordfence threat intelligence at https://www.wordfence.com/threat-intel/vulnerabilities/id/82016921-4efb-47b4-9a75-45cae4ad80f9?source=cve.

Details

CWE(s)
CWE-89

References