CVE-2021-24132
📋 TL;DR
This SQL injection vulnerability in the Slider by 10Web WordPress plugin allows authenticated users with Contributor+ permissions to execute arbitrary SQL commands when the 'Role Options' feature is enabled. Attackers could read, modify, or delete database content, potentially compromising the entire WordPress site. The vulnerability affects versions before 1.2.36.
💻 Affected Systems
- Slider by 10Web WordPress plugin
📦 What is this software?
Slider by 10web
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, site defacement, privilege escalation to administrator, or full site takeover.
Likely Case
Data exfiltration from WordPress database including user credentials, sensitive content, or plugin data.
If Mitigated
Limited impact if proper access controls restrict plugin functionality to trusted administrators only.
🎯 Exploit Status
Exploitation requires authenticated access with at least Contributor permissions and the 'Role Options' feature enabled
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.2.36
Vendor Advisory: https://wordpress.org/plugins/slider-wd/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Slider by 10Web' and click 'Update Now'. 4. Verify version is 1.2.36 or later.
🔧 Temporary Workarounds
Disable Role Options
allPrevent non-admin users from accessing vulnerable plugin functionality
Remove Plugin
linuxTemporarily disable or remove the plugin until patched
wp plugin deactivate slider-wd
wp plugin delete slider-wd
🧯 If You Can't Patch
- Restrict plugin access to trusted administrators only
- Implement web application firewall with SQL injection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Slider by 10Web → Version. If version < 1.2.36, vulnerable.
Check Version:
wp plugin get slider-wd --field=version
Verify Fix Applied:
Confirm plugin version is 1.2.36 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in WordPress debug logs
- Multiple failed authentication attempts followed by plugin access
Network Indicators:
- POST requests to /wp-admin/admin-ajax.php with SQL-like parameters
- Unusual database connection patterns
SIEM Query:
source="wordpress.log" AND ("slider-wd" OR "admin-ajax.php") AND ("SELECT", "UNION", "INSERT", "DELETE")