CVE-2024-13095
📋 TL;DR
The WP Triggers Lite WordPress plugin through version 2.5.3 contains a SQL injection vulnerability due to insufficient input sanitization. This allows authenticated administrators to execute arbitrary SQL commands on the database. Only WordPress sites using the vulnerable plugin versions are affected.
💻 Affected Systems
- WP Triggers Lite WordPress Plugin
📦 What is this software?
Wp Triggers Lite by Wptriggers
⚠️ Risk & Real-World Impact
Worst Case
Administrator could execute arbitrary SQL commands leading to complete database compromise, data theft, privilege escalation, or site takeover.
Likely Case
Administrator could extract sensitive data from the database, modify content, or disrupt site functionality.
If Mitigated
With proper access controls limiting admin accounts, impact is reduced to authorized administrators only.
🎯 Exploit Status
Exploitation requires administrator credentials. SQL injection is a well-understood attack vector with many available tools.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.5.4 or later
Vendor Advisory: https://wpscan.com/vulnerability/74e95fb5-025b-4d4d-a279-844b6ee3e57d/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WP Triggers Lite and click 'Update Now'. 4. Verify plugin version is 2.5.4 or higher.
🔧 Temporary Workarounds
Disable WP Triggers Lite Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate wp-triggers-lite
Restrict Admin Access
allLimit administrator accounts to trusted personnel only
🧯 If You Can't Patch
- Remove administrator access from untrusted users
- Implement web application firewall with SQL injection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Installed Plugins for WP Triggers Lite version 2.5.3 or earlier
Check Version:
wp plugin get wp-triggers-lite --field=version
Verify Fix Applied:
Verify WP Triggers Lite plugin version is 2.5.4 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts to admin accounts
- Unexpected plugin file modifications
Network Indicators:
- SQL error messages in HTTP responses
- Unusual database connection patterns
SIEM Query:
source="wordpress.log" AND "wp-triggers-lite" AND ("SQL" OR "database error")