CVE-2021-24741

9.8 CRITICAL

📋 TL;DR

The Support Board WordPress plugin before version 3.3.4 contains multiple SQL injection vulnerabilities in POST parameters that are not properly escaped. Unauthenticated attackers can exploit these vulnerabilities to execute arbitrary SQL commands on the database. All WordPress sites running vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Support Board WordPress Plugin
Versions: All versions before 3.3.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, modification, or deletion; potential privilege escalation to WordPress administrator; possible remote code execution through database functions.

🟠

Likely Case

Data exfiltration from WordPress database including user credentials, sensitive content, and plugin data; potential site defacement or disruption.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries; database access restricted to plugin's intended functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple POST parameters vulnerable; exploitation requires sending crafted HTTP requests to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.4

Vendor Advisory: https://board.support/changes

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Support Board plugin
4. Click 'Update Now' if update available
5. If no update available, download version 3.3.4+ from WordPress.org
6. Deactivate old version, upload new version, activate

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the Support Board plugin until patched

wp plugin deactivate support-board

Web Application Firewall Rules

all

Block SQL injection patterns in POST parameters

🧯 If You Can't Patch

  • Implement strict input validation for all POST parameters
  • Deploy web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Support Board version number

Check Version:

wp plugin get support-board --field=version

Verify Fix Applied:

Verify plugin version is 3.3.4 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in WordPress debug logs
  • Multiple POST requests with SQL-like patterns to /wp-content/plugins/support-board/

Network Indicators:

  • HTTP POST requests containing SQL keywords (UNION, SELECT, etc.) in parameters

SIEM Query:

source="wordpress.log" AND "support-board" AND ("SQL" OR "database error")

🔗 References

📤 Share & Export