CVE-2024-13440
Published: 09 February 2025
Description
The Super Store Finder plugin for WordPress is vulnerable to SQL Injection via the ‘ssf_wp_user_name’ parameter in all versions up to, and including, 7.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into an already existing query to store cross-site scripting in store reviews.
Security Summary
CVE-2024-13440 is a SQL injection vulnerability in the Super Store Finder plugin for WordPress, affecting all versions up to and including 7.0. The issue stems from insufficient escaping of the user-supplied ‘ssf_wp_user_name’ parameter and lack of sufficient preparation in the existing SQL query, as classified under CWE-89.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction, appending additional SQL queries to an existing one. This enables them to store cross-site scripting payloads in store reviews, resulting in high confidentiality impact and low integrity impact, per its CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N).
Mitigation details are available in the vendor's patch notes at https://superstorefinder.net/support/forums/topic/super-store-finder-for-wordpress-patch-notes/ and Wordfence's threat intelligence advisory at https://www.wordfence.com/threat-intel/vulnerabilities/id/cc468bfd-b9a2-4fe6-b896-d738c767146a?source=cve.
Details
- CWE(s)