CVE-2024-12613
Published: 16 January 2025
Description
The Passwords Manager plugin for WordPress is vulnerable to SQL Injection via the $wpdb->prefix value in several AJAX fuctions in all versions up to, and including, 1.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Security Summary
CVE-2024-12613 is a SQL injection vulnerability in the Passwords Manager plugin for WordPress, affecting all versions up to and including 1.4.8. The flaw occurs in several AJAX functions via the $wpdb->prefix value, stemming from insufficient escaping of user-supplied parameters and inadequate preparation of existing SQL queries, as classified under CWE-89.
Unauthenticated attackers can exploit this vulnerability over the network with low attack complexity, no privileges, and no user interaction required. Exploitation enables appending additional SQL queries to existing ones, allowing extraction of sensitive information from the database, consistent with the CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
A patch addressing the issue is available in the WordPress plugin repository via changeset 3221505 in the file include/pms-passwords-ajax-action.php. Further details on the vulnerability, including threat intelligence, are documented in the Wordfence advisory. Security practitioners should update the plugin immediately to mitigate risks.
Details
- CWE(s)