CVE-2024-13844

4.9 MEDIUM

📋 TL;DR

The Post SMTP WordPress plugin contains a SQL injection vulnerability in the 'columns' parameter that allows authenticated administrators to execute arbitrary SQL queries. This can lead to sensitive database information disclosure. Only WordPress sites using Post SMTP plugin versions up to 3.1.2 are affected.

💻 Affected Systems

Products:
  • Post SMTP Mailer/Email Log (WordPress plugin)
Versions: All versions up to and including 3.1.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated administrator access to exploit. WordPress multisite installations with administrator privileges are also affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator-level attackers could extract all database contents including user credentials, sensitive configuration data, and potentially gain full database control.

🟠

Likely Case

Malicious administrators or compromised admin accounts could extract user data, email configurations, and other sensitive information from the database.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized administrators who already have significant system access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials. Public proof-of-concept code exists in GitHub gists and security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.3 and later

Vendor Advisory: https://wordpress.org/plugins/post-smtp/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Post SMTP Mailer/Email Log. 4. Click 'Update Now' if available. 5. Alternatively, download version 3.1.3+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the Post SMTP plugin until patched

wp plugin deactivate post-smtp

Access Restriction

all

Restrict administrator account access and implement strong authentication controls

🧯 If You Can't Patch

  • Implement strict access controls for administrator accounts and monitor for suspicious activity
  • Deploy web application firewall rules to block SQL injection patterns in POST requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Post SMTP Mailer/Email Log → Version. If version is 3.1.2 or lower, you are vulnerable.

Check Version:

wp plugin get post-smtp --field=version

Verify Fix Applied:

Verify plugin version is 3.1.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in WordPress debug logs
  • Multiple POST requests to /wp-admin/admin-ajax.php with 'columns' parameter containing SQL syntax

Network Indicators:

  • POST requests containing UNION, SELECT, or other SQL keywords in parameters
  • Unusual database query patterns from WordPress application

SIEM Query:

source="wordpress.log" AND "columns" AND ("UNION" OR "SELECT" OR "FROM" OR "WHERE")

🔗 References

📤 Share & Export