CVE-2024-13490

7.5 HIGH

📋 TL;DR

This SQL injection vulnerability in the LTL Freight Quotes – XPO Edition WordPress plugin allows unauthenticated attackers to execute arbitrary SQL queries against the database. All WordPress sites using this plugin up to version 4.3.7 are affected, potentially exposing sensitive data like user credentials, payment information, or other stored content.

💻 Affected Systems

Products:
  • LTL Freight Quotes – XPO Edition WordPress plugin
Versions: All versions up to and including 4.3.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, privilege escalation, or full site takeover through credential extraction and subsequent admin access.

🟠

Likely Case

Extraction of sensitive data from the database including user information, plugin configuration data, and potentially WordPress user credentials.

🟢

If Mitigated

Limited information disclosure if database permissions are properly restricted and sensitive data is encrypted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and SQL injection is a well-understood attack vector with many available tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.3.8 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3235163

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'LTL Freight Quotes – XPO Edition'. 4. Click 'Update Now' if available, or manually update to version 4.3.8+. 5. Verify plugin is active and functioning.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched version is available

Web Application Firewall rule

all

Block requests containing SQL injection patterns targeting edit_id and dropship_edit_id parameters

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries at application level
  • Deploy web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → LTL Freight Quotes – XPO Edition version number

Check Version:

wp plugin list --name='LTL Freight Quotes – XPO Edition' --field=version

Verify Fix Applied:

Confirm plugin version is 4.3.8 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in WordPress debug logs
  • Multiple requests with SQL-like patterns in edit_id/dropship_edit_id parameters
  • Unexpected database queries from web server process

Network Indicators:

  • HTTP requests with SQL injection payloads in URL parameters
  • Unusual traffic patterns to plugin-specific endpoints

SIEM Query:

web.url:*edit_id=* AND (web.url:*UNION* OR web.url:*SELECT* OR web.url:*INSERT* OR web.url:*UPDATE* OR web.url:*DELETE*)

🔗 References

📤 Share & Export