Cyber Posture

CVE-2024-13440

High

Published: 09 February 2025

Published
09 February 2025
Modified
13 February 2025
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0014 33.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

The Super Store Finder plugin for WordPress is vulnerable to SQL Injection via the ‘ssf_wp_user_name’ parameter in all versions up to, and including, 7.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into an already existing query to store cross-site scripting in store reviews.

Security Summary

CVE-2024-13440 is a SQL injection vulnerability in the Super Store Finder plugin for WordPress, affecting all versions up to and including 7.0. The issue stems from insufficient escaping of the user-supplied ‘ssf_wp_user_name’ parameter and lack of sufficient preparation in the existing SQL query, as classified under CWE-89.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction, appending additional SQL queries to an existing one. This enables them to store cross-site scripting payloads in store reviews, resulting in high confidentiality impact and low integrity impact, per its CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N).

Mitigation details are available in the vendor's patch notes at https://superstorefinder.net/support/forums/topic/super-store-finder-for-wordpress-patch-notes/ and Wordfence's threat intelligence advisory at https://www.wordfence.com/threat-intel/vulnerabilities/id/cc468bfd-b9a2-4fe6-b896-d738c767146a?source=cve.

Details

CWE(s)
CWE-89

Affected Products

superstorefinder
super store finder
≤ 7.1

References