CVE-2024-13474

7.5 HIGH

📋 TL;DR

This SQL injection vulnerability in the LTL Freight Quotes – Purolator Edition WordPress plugin allows unauthenticated attackers to execute arbitrary SQL queries through the 'dropship_edit_id' and 'edit_id' parameters. All WordPress sites using this plugin up to version 2.2.3 are affected, potentially exposing sensitive database information.

💻 Affected Systems

Products:
  • LTL Freight Quotes – Purolator Edition WordPress Plugin
Versions: All versions up to and including 2.2.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including extraction of sensitive data (user credentials, payment information, shipping details), data manipulation, or potential server takeover via SQL injection chaining.

🟠

Likely Case

Data exfiltration of sensitive information from the WordPress database including user data, plugin-specific freight/shipping information, and potentially other site data.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database user privilege restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and involves simple SQL injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.2.4 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3244300%40ltl-freight-quotes-purolator-freight-edition&new=3244300%40ltl-freight-quotes-purolator-freight-edition&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'LTL Freight Quotes – Purolator Edition'. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 2.2.4+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

WordPress

Disable the vulnerable plugin until patched

wp plugin deactivate ltl-freight-quotes-purolator-freight-edition

WAF Rule Implementation

all

Block SQL injection patterns targeting the vulnerable parameters

🧯 If You Can't Patch

  • Disable the LTL Freight Quotes – Purolator Edition plugin immediately
  • Implement web application firewall rules to block SQL injection patterns targeting 'dropship_edit_id' and 'edit_id' parameters

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for LTL Freight Quotes – Purolator Edition version number

Check Version:

wp plugin get ltl-freight-quotes-purolator-freight-edition --field=version

Verify Fix Applied:

Confirm plugin version is 2.2.4 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple requests to plugin endpoints with SQL-like payloads in parameters
  • Error logs showing SQL syntax errors

Network Indicators:

  • HTTP requests containing SQL injection patterns in 'dropship_edit_id' or 'edit_id' parameters
  • Unusual traffic patterns to plugin-specific endpoints

SIEM Query:

SELECT * FROM web_logs WHERE (url LIKE '%dropship_edit_id%' OR url LIKE '%edit_id%') AND (request_body LIKE '%UNION%' OR request_body LIKE '%SELECT%' OR request_body LIKE '%INSERT%' OR request_body LIKE '%UPDATE%' OR request_body LIKE '%DELETE%' OR request_body LIKE '%--%' OR request_body LIKE '%/*%')

🔗 References

📤 Share & Export