CVE-2024-13478
📋 TL;DR
This SQL injection vulnerability in the LTL Freight Quotes WordPress plugin allows unauthenticated attackers to execute arbitrary SQL queries through the 'dropship_edit_id' and 'edit_id' parameters. Attackers can extract sensitive database information including user credentials, payment data, and other confidential information. All WordPress sites using this plugin up to version 3.6.4 are affected.
💻 Affected Systems
- LTL Freight Quotes – TForce Edition WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, privilege escalation, and potential site takeover through credential extraction.
Likely Case
Extraction of sensitive business data, customer information, and administrative credentials from the WordPress database.
If Mitigated
Limited information disclosure if database permissions are properly restricted and sensitive data is encrypted.
🎯 Exploit Status
SQL injection via URL parameters requires minimal technical skill to exploit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 3.6.4
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find 'LTL Freight Quotes – TForce Edition'. 4. Click 'Update Now' or manually update to latest version. 5. Verify plugin version is above 3.6.4.
🔧 Temporary Workarounds
Temporary Plugin Deactivation
WordPressDisable the vulnerable plugin until patched version is available
wp plugin deactivate ltl-freight-quotes-ups-edition
🧯 If You Can't Patch
- Implement WAF rules to block SQL injection patterns targeting 'dropship_edit_id' and 'edit_id' parameters
- Restrict database user permissions to read-only for the WordPress application user
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > LTL Freight Quotes – TForce Edition version number
Check Version:
wp plugin list --name='LTL Freight Quotes – TForce Edition' --field=version
Verify Fix Applied:
Verify plugin version is above 3.6.4 and test parameter inputs with SQL injection payloads
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in WordPress logs
- Multiple requests with SQL injection patterns in parameters
Network Indicators:
- HTTP requests containing SQL keywords in 'dropship_edit_id' or 'edit_id' parameters
SIEM Query:
source="wordpress.log" AND ("dropship_edit_id" OR "edit_id") AND ("UNION" OR "SELECT" OR "INSERT" OR "UPDATE" OR "DELETE" OR "DROP" OR "OR 1=1")