CVE-2024-13534
📋 TL;DR
This SQL injection vulnerability in the Small Package Quotes – Worldwide Express Edition WordPress plugin allows unauthenticated attackers to inject malicious SQL queries through the 'edit_id' and 'dropship_edit_id' parameters. Attackers can extract sensitive database information including user credentials, plugin data, and potentially other WordPress data. All WordPress sites using this plugin up to version 5.2.18 are affected.
💻 Affected Systems
- Small Package Quotes – Worldwide Express Edition WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to credential theft, data exfiltration, privilege escalation, and potential site takeover.
Likely Case
Extraction of sensitive plugin data, user information, and potential access to WordPress user credentials.
If Mitigated
Limited information disclosure if database permissions are properly restricted and sensitive data is encrypted.
🎯 Exploit Status
SQL injection via URL parameters requires minimal technical skill to exploit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 5.2.19 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Small Package Quotes – Worldwide Express Edition'. 4. Click 'Update Now' if available. 5. Alternatively, download version 5.2.19+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable Plugin
WordPressTemporarily disable the vulnerable plugin until patched.
wp plugin deactivate small-package-quotes-wwe-edition
Web Application Firewall Rules
allBlock SQL injection patterns targeting edit_id and dropship_edit_id parameters.
🧯 If You Can't Patch
- Implement strict input validation for all plugin parameters
- Deploy a web application firewall with SQL injection protection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Small Package Quotes – Worldwide Express Edition version number.
Check Version:
wp plugin get small-package-quotes-wwe-edition --field=version
Verify Fix Applied:
Verify plugin version is 5.2.19 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in WordPress logs
- Multiple requests with SQL-like patterns in edit_id/dropship_edit_id parameters
- Database connection spikes
Network Indicators:
- HTTP requests containing SQL keywords in URL parameters
- Unusual traffic to plugin-specific endpoints
SIEM Query:
source="wordpress.log" AND ("edit_id" OR "dropship_edit_id") AND ("UNION" OR "SELECT" OR "INSERT" OR "UPDATE" OR "DELETE")