CVE-2024-24868
📋 TL;DR
This SQL injection vulnerability in the WordPress SP Project & Document Manager plugin allows attackers to execute arbitrary SQL commands through the plugin's interface. It affects all versions up to 4.69 and can be exploited by users with contributor-level access or higher.
💻 Affected Systems
- WordPress SP Project & Document Manager plugin
📦 What is this software?
Sp Project \& Document Manager by Smartypantsplugins
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, privilege escalation, or full site takeover
Likely Case
Unauthorized data access, modification of database content, or extraction of sensitive information
If Mitigated
Limited impact if proper input validation and parameterized queries are implemented
🎯 Exploit Status
Exploitation requires authenticated user access at contributor level or higher
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.70 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins > Installed Plugins
3. Find SP Project & Document Manager
4. Click Update Now
5. Verify version is 4.70 or higher
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDisable the vulnerable plugin until patched
wp plugin deactivate sp-client-document-manager
Restrict User Roles
allTemporarily limit contributor-level access
🧯 If You Can't Patch
- Implement web application firewall (WAF) with SQL injection rules
- Restrict database user permissions to minimum required
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > SP Project & Document Manager version
Check Version:
wp plugin get sp-client-document-manager --field=version
Verify Fix Applied:
Confirm plugin version is 4.70 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts from contributor accounts
Network Indicators:
- SQL syntax in HTTP POST parameters
- Unusual database connection patterns
SIEM Query:
source="web_server" AND ("sqlmap" OR "UNION SELECT" OR "information_schema" OR "sleep(")
🔗 References
- https://patchstack.com/database/vulnerability/sp-client-document-manager/wordpress-sp-project-document-manager-plugin-4-69-contributor-sql-injection-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/sp-client-document-manager/wordpress-sp-project-document-manager-plugin-4-69-contributor-sql-injection-vulnerability?_s_id=cve