CVE-2024-12613

7.5 HIGH

📋 TL;DR

This SQL injection vulnerability in the WordPress Passwords Manager plugin allows unauthenticated attackers to execute arbitrary SQL queries against the database. Attackers can extract sensitive information including user credentials, password entries, and other stored data. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • WordPress Passwords Manager plugin
Versions: All versions up to and including 1.4.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to credential theft, data exfiltration, privilege escalation, and potential site takeover.

🟠

Likely Case

Extraction of sensitive password manager data, user information, and potentially WordPress admin credentials.

🟢

If Mitigated

Limited information disclosure if database permissions are restricted and web application firewall blocks SQL injection patterns.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation via public AJAX endpoints makes this easily accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit, but external threat is more significant.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting specific SQL injection payloads targeting AJAX endpoints, but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.4.9 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-passwords-ajax-action.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Passwords Manager' and click 'Update Now'. 4. Verify plugin version is 1.4.9 or higher.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Passwords Manager plugin until patched

wp plugin deactivate passwords-manager

Web Application Firewall rule

all

Block SQL injection patterns targeting AJAX endpoints

🧯 If You Can't Patch

  • Disable the Passwords Manager plugin immediately
  • Implement strict WAF rules blocking SQL injection patterns and monitor AJAX endpoint access

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Passwords Manager version. If version is 1.4.8 or lower, you are vulnerable.

Check Version:

wp plugin get passwords-manager --field=version

Verify Fix Applied:

Verify plugin version is 1.4.9 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple AJAX requests to /wp-admin/admin-ajax.php with SQL patterns
  • Failed login attempts following AJAX requests

Network Indicators:

  • POST requests to admin-ajax.php with SQL keywords in parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="web_access.log" AND uri="/wp-admin/admin-ajax.php" AND (param="action" AND value="pms_*") AND (param="*" AND value MATCHES "(?i)(union|select|insert|update|delete|drop|--|#|\/\*)")

🔗 References

📤 Share & Export