CVE-2024-13234
📋 TL;DR
The Product Table by WBW WordPress plugin contains an SQL injection vulnerability in the 'additionalCondition' parameter. Unauthenticated attackers can exploit this to execute arbitrary SQL queries and extract sensitive database information. All WordPress sites using this plugin version 2.1.2 or earlier are affected.
💻 Affected Systems
- Product Table by WBW WordPress plugin
📦 What is this software?
Product Table by Woobewoo
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including user credentials, sensitive customer data, and administrative access leading to site takeover.
Likely Case
Data exfiltration of user information, product data, and potentially WordPress configuration details.
If Mitigated
Limited information disclosure if database permissions are properly restricted and sensitive data is encrypted.
🎯 Exploit Status
Attackers can exploit this without authentication by manipulating the additionalCondition parameter in requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 2.1.2
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Product Table by WBW' and click 'Update Now'. 4. Verify plugin version is higher than 2.1.2.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the plugin until patched version is available
Web Application Firewall rule
allBlock requests containing SQL injection patterns targeting the additionalCondition parameter
🧯 If You Can't Patch
- Implement strict input validation and sanitization for all user-supplied parameters
- Deploy a web application firewall with SQL injection protection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for 'Product Table by WBW' version 2.1.2 or lower
Check Version:
wp plugin list --name='product-table-by-wbw' --field=version
Verify Fix Applied:
Confirm plugin version is higher than 2.1.2 after update
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple requests with SQL-like patterns in additionalCondition parameter
- Unexpected database errors
Network Indicators:
- HTTP requests with SQL injection payloads in parameters
- Unusual traffic patterns to plugin endpoints
SIEM Query:
SELECT * FROM web_logs WHERE url LIKE '%additionalCondition%' AND (request_body LIKE '%UNION%' OR request_body LIKE '%SELECT%' OR request_body LIKE '%INSERT%')