CVE-2024-13440

8.2 HIGH

📋 TL;DR

The Super Store Finder WordPress plugin contains an SQL injection vulnerability in the 'ssf_wp_user_name' parameter that allows unauthenticated attackers to inject malicious SQL queries. This can lead to data theft, manipulation, or cross-site scripting payload storage in store reviews. All WordPress sites using this plugin up to version 7.0 are affected.

💻 Affected Systems

Products:
  • Super Store Finder WordPress Plugin
Versions: All versions up to and including 7.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable plugin version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive user data theft, administrative account takeover, and persistent cross-site scripting attacks against all site visitors.

🟠

Likely Case

Unauthenticated attackers extract database information, modify store review content with malicious scripts, and potentially gain administrative access to the WordPress site.

🟢

If Mitigated

With proper input validation and parameterized queries, the vulnerability would be prevented entirely, allowing only legitimate store review functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires understanding of SQL injection techniques but is accessible to moderately skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 7.1 or later

Vendor Advisory: https://superstorefinder.net/support/forums/topic/super-store-finder-for-wordpress-patch-notes/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Super Store Finder plugin. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 7.1+ from vendor site and replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Super Store Finder plugin to prevent exploitation while planning permanent fix.

Web Application Firewall Rule

all

Add WAF rule to block requests containing SQL injection patterns targeting the ssf_wp_user_name parameter.

🧯 If You Can't Patch

  • Implement strict input validation for the ssf_wp_user_name parameter to allow only alphanumeric characters
  • Deploy a web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Super Store Finder → Version number. If version is 7.0 or lower, you are vulnerable.

Check Version:

wp plugin list --name=super-store-finder --field=version

Verify Fix Applied:

After updating, verify plugin version shows 7.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in WordPress debug logs
  • Multiple requests to store review endpoints with unusual parameter values
  • Database query patterns containing UNION, SELECT, or other SQL injection keywords

Network Indicators:

  • HTTP POST requests to store review endpoints containing SQL syntax in parameters
  • Unusual traffic spikes to plugin-specific endpoints

SIEM Query:

source="wordpress.log" AND ("ssf_wp_user_name" AND ("UNION" OR "SELECT" OR "INSERT" OR "UPDATE" OR "DELETE"))

🔗 References

📤 Share & Export