CVE-2024-43976

9.3 CRITICAL

📋 TL;DR

This SQL injection vulnerability in the Super Store Finder WordPress plugin allows attackers to execute arbitrary SQL commands on the database. All WordPress sites running Super Store Finder versions up to 6.9.7 are affected, potentially exposing sensitive data.

💻 Affected Systems

Products:
  • Super Store Finder WordPress Plugin
Versions: n/a through 6.9.7
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Super Store Finder plugin enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, privilege escalation, authentication bypass, and potential remote code execution via database functions.

🟠

Likely Case

Unauthorized data access including user credentials, personal information, and site content extraction.

🟢

If Mitigated

Limited impact with proper input validation and database user privilege restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly exploited with automated tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.9.8 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/superstorefinder-wp/wordpress-super-store-finder-plugin-6-9-7-sql-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Super Store Finder and click 'Update Now'. 4. Verify update to version 6.9.8 or higher.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate superstorefinder-wp

WAF Rule

all

Implement web application firewall rules to block SQL injection patterns.

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in custom code
  • Restrict database user permissions to minimum required privileges

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Super Store Finder version number.

Check Version:

wp plugin get superstorefinder-wp --field=version

Verify Fix Applied:

Confirm plugin version is 6.9.8 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in web server logs
  • Multiple failed SQL query attempts
  • Suspicious parameter values in POST/GET requests

Network Indicators:

  • SQL syntax in HTTP parameters
  • UNION SELECT patterns in requests
  • Database error messages in responses

SIEM Query:

web_requests WHERE (url CONTAINS 'superstorefinder' OR referrer CONTAINS 'superstorefinder') AND (params CONTAINS 'UNION' OR params CONTAINS 'SELECT' OR params CONTAINS 'OR 1=1')

🔗 References

📤 Share & Export