CVE-2024-25910

9.8 CRITICAL

📋 TL;DR

This CVE describes an unauthenticated SQL injection vulnerability in the Skymoonlabs MoveTo WordPress plugin. Attackers can execute arbitrary SQL commands without authentication, potentially compromising the database. All WordPress sites using MoveTo plugin versions up to 6.2 are affected.

💻 Affected Systems

Products:
  • Skymoonlabs MoveTo WordPress Plugin
Versions: n/a through 6.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable MoveTo plugin versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, privilege escalation, remote code execution, or site takeover.

🟠

Likely Case

Database information disclosure, data manipulation, or authentication bypass.

🟢

If Mitigated

Limited impact with proper input validation and database permissions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated exploitation with publicly available details makes this highly exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.3 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/moveto/wordpress-moveto-plugin-6-2-unauthenticated-sql-injection-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find MoveTo plugin and update to version 6.3 or later. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable MoveTo Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate moveto

Web Application Firewall Rules

all

Implement WAF rules to block SQL injection patterns targeting MoveTo endpoints.

🧯 If You Can't Patch

  • Implement network segmentation to isolate WordPress servers from sensitive databases.
  • Enable database activity monitoring and alert on unusual SQL queries.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for MoveTo version 6.2 or earlier.

Check Version:

wp plugin list --name=moveto --field=version

Verify Fix Applied:

Confirm MoveTo plugin version is 6.3 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in WordPress logs
  • Multiple failed SQL queries from single IP
  • Requests to MoveTo plugin endpoints with SQL syntax

Network Indicators:

  • HTTP POST requests containing SQL keywords to /wp-content/plugins/moveto/
  • Unusual database connection patterns

SIEM Query:

source="wordpress.log" AND "moveto" AND ("SQL" OR "database" OR "syntax")

🔗 References

📤 Share & Export