CVE-2024-13426

The WP-Polls plugin for WordPress is vulnerable to SQL Injection via COOKIE in all versions up to, and including, 2.77.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries. Those queries are stored and results are not displayed to the attacker, which means they cannot be exploited to obtain any additional information about the database. However, a properly configured payload allows for the injection of malicious JavaScript resulting in Stored Cross-Site Scripting.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wp-polls_project:wp-polls:*:*:*:*:*:wordpress:*:*

History

24 Jan 2025, 18:37

Type Values Removed Values Added
References () https://github.com/WordPress/wordpress-develop/blob/a82874058f58575dbba64ce09b6dcbd43ccf5fdc/src/wp-includes/default-constants.php#L249 - () https://github.com/WordPress/wordpress-develop/blob/a82874058f58575dbba64ce09b6dcbd43ccf5fdc/src/wp-includes/default-constants.php#L249 - Patch
References () https://github.com/lesterchan/wp-polls - () https://github.com/lesterchan/wp-polls - Product
References () https://github.com/lesterchan/wp-polls/blob/97ab44c2d4c3a3d308ce8b87dae8b2a8f7147f0e/polls-logs.php#L294 - () https://github.com/lesterchan/wp-polls/blob/97ab44c2d4c3a3d308ce8b87dae8b2a8f7147f0e/polls-logs.php#L294 - Patch
References () https://github.com/lesterchan/wp-polls/blob/97ab44c2d4c3a3d308ce8b87dae8b2a8f7147f0e/polls-logs.php#L97 - () https://github.com/lesterchan/wp-polls/blob/97ab44c2d4c3a3d308ce8b87dae8b2a8f7147f0e/polls-logs.php#L97 - Patch
References () https://github.com/lesterchan/wp-polls/blob/97ab44c2d4c3a3d308ce8b87dae8b2a8f7147f0e/wp-polls.php#L1378 - () https://github.com/lesterchan/wp-polls/blob/97ab44c2d4c3a3d308ce8b87dae8b2a8f7147f0e/wp-polls.php#L1378 - Patch
References () https://github.com/lesterchan/wp-polls/blob/97ab44c2d4c3a3d308ce8b87dae8b2a8f7147f0e/wp-polls.php#L1416 - () https://github.com/lesterchan/wp-polls/blob/97ab44c2d4c3a3d308ce8b87dae8b2a8f7147f0e/wp-polls.php#L1416 - Patch
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3224709%40wp-polls%2Ftrunk&old=2949758%40wp-polls%2Ftrunk&sfp_email=&sfph_mail= - () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3224709%40wp-polls%2Ftrunk&old=2949758%40wp-polls%2Ftrunk&sfp_email=&sfph_mail= - Patch
References () https://wordpress.org/plugins/wp-polls/ - () https://wordpress.org/plugins/wp-polls/ - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/b76de574-2627-46cd-9817-134a009ac3bd?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/b76de574-2627-46cd-9817-134a009ac3bd?source=cve - Third Party Advisory
CPE cpe:2.3:a:wp-polls_project:wp-polls:*:*:*:*:*:wordpress:*:*
Summary
  • (es) El complemento WP-Polls para WordPress es vulnerable a la inyección SQL a través de COOKIE en todas las versiones hasta la 2.77.2 y incluida, debido a un escape insuficiente en el parámetro proporcionado por el usuario y a la falta de preparación suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a las consultas ya existentes. Esas consultas se almacenan y los resultados no se muestran al atacante, lo que significa que no se pueden explotar para obtener información adicional sobre la base de datos. Sin embargo, un payload correctamente configurado permite la inyección de JavaScript malicioso que da como resultado Cross-Site Scripting Almacenado.
First Time Wp-polls Project wp-polls
Wp-polls Project

22 Jan 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-22 03:15

Updated : 2025-01-24 18:37


NVD link : CVE-2024-13426

Mitre link : CVE-2024-13426

CVE.ORG link : CVE-2024-13426


JSON object : View

Products Affected

wp-polls_project

  • wp-polls
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')