CVE-2024-43917

9.3 CRITICAL

📋 TL;DR

This SQL injection vulnerability in the TI WooCommerce Wishlist WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It affects all WordPress sites using this plugin up to version 2.8.2. Successful exploitation could lead to data theft, modification, or complete database compromise.

💻 Affected Systems

Products:
  • TI WooCommerce Wishlist WordPress Plugin
Versions: All versions up to and including 2.8.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the TI Wishlist plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive customer data (PII, payment info), privilege escalation to admin, and potential site takeover.

🟠

Likely Case

Data exfiltration of user information, wishlist contents, and potentially other WordPress data accessible via SQL queries.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented, with database permissions restricted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized quickly. The CVSS 9.3 score suggests significant impact potential.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8.3 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/ti-woocommerce-wishlist/wordpress-ti-woocommerce-wishlist-plugin-2-8-2-sql-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'TI WooCommerce Wishlist'. 4. Click 'Update Now' if available. 5. If not, download version 2.8.3+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate ti-woocommerce-wishlist

Web Application Firewall Rule

all

Add SQL injection detection rules to WAF.

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user inputs
  • Apply principle of least privilege to database user accounts

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins > Installed Plugins.

Check Version:

wp plugin get ti-woocommerce-wishlist --field=version

Verify Fix Applied:

Confirm plugin version is 2.8.3 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts from single IP
  • Unexpected database errors

Network Indicators:

  • SQL syntax in HTTP parameters
  • Unusual POST requests to wishlist endpoints

SIEM Query:

source="web_server" AND (uri="*wishlist*" AND (param="*' OR *" OR param="*;--*"))

🔗 References

📤 Share & Export