Cyber Posture

CVE-2024-12613

High

Published: 16 January 2025

Published
16 January 2025
Modified
17 January 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0070 72.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

The Passwords Manager plugin for WordPress is vulnerable to SQL Injection via the $wpdb->prefix value in several AJAX fuctions in all versions up to, and including, 1.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Security Summary

CVE-2024-12613 is a SQL injection vulnerability in the Passwords Manager plugin for WordPress, affecting all versions up to and including 1.4.8. The flaw occurs in several AJAX functions via the $wpdb->prefix value, stemming from insufficient escaping of user-supplied parameters and inadequate preparation of existing SQL queries, as classified under CWE-89.

Unauthenticated attackers can exploit this vulnerability over the network with low attack complexity, no privileges, and no user interaction required. Exploitation enables appending additional SQL queries to existing ones, allowing extraction of sensitive information from the database, consistent with the CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

A patch addressing the issue is available in the WordPress plugin repository via changeset 3221505 in the file include/pms-passwords-ajax-action.php. Further details on the vulnerability, including threat intelligence, are documented in the Wordfence advisory. Security practitioners should update the plugin immediately to mitigate risks.

Details

CWE(s)
CWE-89

Affected Products

hirewebxperts
passwords manager
≤ 1.5.1

References