CVE-2024-37112
📋 TL;DR
This is an unauthenticated SQL injection vulnerability in the WordPress WishList Member X plugin. Attackers can execute arbitrary SQL queries on affected websites without needing credentials. All WordPress sites running vulnerable versions of this membership plugin are affected.
💻 Affected Systems
- WordPress WishList Member X plugin
📦 What is this software?
Wishlist Member by Wishlist Member
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise allowing data theft, privilege escalation, and full site takeover via arbitrary SQL execution.
Likely Case
Database information disclosure, user data theft, and potential administrative access to the WordPress site.
If Mitigated
Limited impact if proper WAF rules and database permissions are configured to restrict SQL execution.
🎯 Exploit Status
Public exploit details available on Patchstack; SQL injection is a well-understood attack vector with many automated tools available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.26.7
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WishList Member X and update to version 3.26.7 or later. 4. Verify the update completed successfully.
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDisable the vulnerable plugin until patching is possible
wp plugin deactivate wishlist-member-x
Web Application Firewall Rules
allImplement WAF rules to block SQL injection patterns targeting this plugin
🧯 If You Can't Patch
- Disable the WishList Member X plugin immediately
- Implement strict network segmentation and limit database user permissions to minimum required
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → WishList Member X version number
Check Version:
wp plugin get wishlist-member-x --field=version
Verify Fix Applied:
Confirm plugin version is 3.26.7 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in WordPress logs
- Multiple failed login attempts from single IP
- Unexpected database queries
Network Indicators:
- HTTP requests with SQL injection patterns to plugin endpoints
- Unusual database connection patterns
SIEM Query:
source="wordpress.log" AND ("wishlist-member" OR "sql syntax" OR "database error")
🔗 References
- https://patchstack.com/database/vulnerability/wishlist-member-x/wordpress-wishlist-member-x-plugin-3-25-1-unauthenticated-arbitrary-sql-query-execution-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/wishlist-member-x/wordpress-wishlist-member-x-plugin-3-25-1-unauthenticated-arbitrary-sql-query-execution-vulnerability?_s_id=cve