CVE-2024-12615
📋 TL;DR
The Passwords Manager WordPress plugin contains a SQL injection vulnerability that allows authenticated attackers with Subscriber-level access or higher to execute arbitrary SQL queries. This can lead to extraction of sensitive data from the database, including passwords and other confidential information stored by the plugin. All WordPress sites using this plugin up to version 1.4.8 are affected.
💻 Affected Systems
- Passwords Manager WordPress Plugin
📦 What is this software?
Passwords Manager by Hirewebxperts
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to credential theft, privilege escalation, and potential site takeover.
Likely Case
Extraction of sensitive password data stored by the plugin, potentially exposing user credentials.
If Mitigated
Limited impact if proper input validation and prepared statements are implemented.
🎯 Exploit Status
Exploitation requires authenticated access but uses common SQL injection techniques; weaponization is likely given the sensitive nature of password manager data.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.4.9 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Passwords Manager' and click 'Update Now'. 4. Verify update to version 1.4.9 or later.
🔧 Temporary Workarounds
Disable Vulnerable Plugin
allTemporarily disable the Passwords Manager plugin until patched.
wp plugin deactivate passwords-manager
Restrict User Roles
allLimit Subscriber and higher role assignments to trusted users only.
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block SQL injection patterns
- Restrict database user permissions to read-only for application accounts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Passwords Manager version; if version is 1.4.8 or lower, you are vulnerable.
Check Version:
wp plugin get passwords-manager --field=version
Verify Fix Applied:
Verify plugin version is 1.4.9 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual database queries from WordPress AJAX endpoints
- Multiple failed login attempts followed by SQL-like query patterns
Network Indicators:
- POST requests to /wp-admin/admin-ajax.php with SQL injection payloads in parameters
SIEM Query:
source="wordpress.log" AND "admin-ajax.php" AND ("UNION" OR "SELECT" OR "FROM" OR "WHERE" OR "--")
🔗 References
- https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/admin-page/addon/csv-export/index.php
- https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-categories-ajax-action.php
- https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-passwords-ajax-action.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ce8397d5-6637-4faa-be1f-9cf52c25be9b?source=cve