CVE-2024-2879

9.8 CRITICAL

📋 TL;DR

The LayerSlider WordPress plugin contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries. This can lead to sensitive database information disclosure, including user credentials and site data. All WordPress sites using vulnerable versions of LayerSlider are affected.

💻 Affected Systems

Products:
  • LayerSlider WordPress Plugin
Versions: 7.9.11 and 7.10.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable LayerSlider versions installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including admin credential theft, data exfiltration, and potential site takeover via privilege escalation.

🟠

Likely Case

Unauthenticated attackers extract sensitive data like user emails, hashed passwords, and site configuration information.

🟢

If Mitigated

Attack attempts are logged but blocked by proper input validation and query parameterization.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via ls_get_popup_markup action requires no authentication and has public proof-of-concept available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.10.1

Vendor Advisory: https://layerslider.com/release-log/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find LayerSlider and click 'Update Now'. 4. Verify version is 7.10.1 or later.

🔧 Temporary Workarounds

Disable LayerSlider Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate LayerSlider

Web Application Firewall Rule

all

Block requests to the vulnerable endpoint using WAF rules.

Block POST requests containing 'action=ls_get_popup_markup'

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries at application level
  • Deploy web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → LayerSlider version. If version is 7.9.11 or 7.10.0, system is vulnerable.

Check Version:

wp plugin list --name=LayerSlider --field=version

Verify Fix Applied:

Confirm LayerSlider version is 7.10.1 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=ls_get_popup_markup containing SQL keywords
  • Unusual database query patterns from WordPress application

Network Indicators:

  • HTTP requests with SQL injection payloads in POST parameters
  • Multiple rapid requests to admin-ajax.php endpoint

SIEM Query:

source="web_logs" AND uri="/wp-admin/admin-ajax.php" AND post_data="*action=ls_get_popup_markup*" AND (post_data="*UNION*" OR post_data="*SELECT*" OR post_data="*FROM*" OR post_data="*WHERE*")

🔗 References

📤 Share & Export