CVE-2024-11372
📋 TL;DR
The Connexion Logs WordPress plugin through version 3.0.2 contains a SQL injection vulnerability due to insufficient input sanitization. This allows authenticated administrators to execute arbitrary SQL commands on the database. Only WordPress sites with this specific plugin installed and administrators with plugin access are affected.
💻 Affected Systems
- Connexion Logs WordPress Plugin
📦 What is this software?
Connexion Logs by Floriansimunek
⚠️ Risk & Real-World Impact
Worst Case
An attacker with admin privileges could execute arbitrary SQL commands, leading to complete database compromise, data theft, privilege escalation, or remote code execution via database functions.
Likely Case
Malicious administrators or compromised admin accounts could extract sensitive data, modify database content, or disrupt website functionality.
If Mitigated
With proper access controls and admin account security, the risk is limited to authorized administrators who would already have extensive system access.
🎯 Exploit Status
Exploitation requires administrator-level access to WordPress. The vulnerability is in a parameter that admins can control through the plugin interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.0.3 or later
Vendor Advisory: https://wpscan.com/vulnerability/de74199a-001e-4388-82ae-70cfd5a49457/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Connexion Logs' plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin, then install latest version from WordPress repository.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily deactivate the Connexion Logs plugin until patched version is available.
wp plugin deactivate connexion-logs
Remove Plugin
allCompletely remove the vulnerable plugin from the WordPress installation.
wp plugin delete connexion-logs
🧯 If You Can't Patch
- Restrict admin access to only trusted personnel and implement strong authentication for admin accounts.
- Implement web application firewall (WAF) rules to block SQL injection patterns targeting the plugin endpoints.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Installed Plugins for Connexion Logs version. If version is 3.0.2 or earlier, system is vulnerable.
Check Version:
wp plugin get connexion-logs --field=version
Verify Fix Applied:
After update, verify Connexion Logs plugin version is 3.0.3 or later in WordPress admin plugins page.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in WordPress or database logs
- Multiple failed login attempts to admin accounts
- Unexpected database schema changes
Network Indicators:
- HTTP requests to /wp-admin/admin.php?page=connexion-logs with SQL injection patterns in parameters
SIEM Query:
source="wordpress.log" AND ("connexion-logs" OR "admin.php?page=connexion-logs") AND (UNION SELECT OR "' OR "--" OR ";--")