CVE-2024-11267

8.8 HIGH

📋 TL;DR

The JSP Store Locator WordPress plugin version 1.0 contains a SQL injection vulnerability due to insufficient input sanitization. Attackers with Contributor-level access can exploit this to execute arbitrary SQL commands, potentially compromising the database. This affects all WordPress sites using the vulnerable plugin version.

💻 Affected Systems

Products:
  • JSP Store Locator WordPress plugin
Versions: 1.0 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have Contributor-level WordPress access; vulnerable in default plugin configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, modification, or deletion; potential privilege escalation to administrator; possible remote code execution via database functions.

🟠

Likely Case

Unauthorized data access, modification of plugin settings, extraction of sensitive information like user credentials or personal data.

🟢

If Mitigated

Limited to data within the plugin's database tables if proper input validation and parameterized queries are implemented elsewhere.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires Contributor access; SQL injection techniques are well-documented and easily weaponized once specific vulnerable parameter is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://wpscan.com/vulnerability/fcbdc11a-a194-46e4-8c22-11010b98fdab/

Restart Required: No

Instructions:

1. Remove the JSP Store Locator plugin completely. 2. Install an alternative store locator plugin from a reputable source. 3. Review database for any unauthorized changes.

🔧 Temporary Workarounds

Remove Contributor Access

all

Temporarily disable or restrict Contributor user role until plugin is removed.

Web Application Firewall Rule

all

Implement WAF rules to block SQL injection patterns targeting the plugin.

🧯 If You Can't Patch

  • Immediately remove the JSP Store Locator plugin from all WordPress installations
  • Implement strict access controls to limit Contributor role creation and monitor existing Contributor accounts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > JSP Store Locator. If version is 1.0 or earlier, you are vulnerable.

Check Version:

wp plugin list --name='JSP Store Locator' --field=version

Verify Fix Applied:

Confirm the JSP Store Locator plugin is no longer installed in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries containing SQL injection patterns
  • Multiple failed login attempts followed by Contributor account creation
  • Unexpected database errors in WordPress logs

Network Indicators:

  • HTTP POST requests to wp-admin/admin-ajax.php with SQL payloads
  • Unusual database connection patterns from web server

SIEM Query:

source="wordpress.log" AND ("SQL syntax" OR "database error" OR "wp_jsp_store_locator")

🔗 References

📤 Share & Export