CVE-2024-43978

9.3 CRITICAL

📋 TL;DR

This SQL injection vulnerability in the Super Store Finder WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It affects all WordPress sites running Super Store Finder versions before 6.9.8. Successful exploitation could lead to data theft, modification, or complete database compromise.

💻 Affected Systems

Products:
  • Super Store Finder WordPress Plugin
Versions: All versions before 6.9.8
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the Super Store Finder plugin active. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive data exfiltration, privilege escalation, remote code execution via database functions, and potential site takeover.

🟠

Likely Case

Data theft from the WordPress database including user credentials, personal information, and plugin-specific data, potentially leading to further attacks.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries in place, potentially only error messages or minor data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities in WordPress plugins are frequently weaponized. The public advisory suggests exploitation details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.9.8

Vendor Advisory: https://patchstack.com/database/vulnerability/superstorefinder-wp/wordpress-super-store-finder-plugin-6-9-8-sql-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Super Store Finder and click 'Update Now'. 4. Verify version shows 6.9.8 or higher.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Super Store Finder plugin until patched

wp plugin deactivate superstorefinder-wp

Web Application Firewall

all

Deploy WAF rules to block SQL injection patterns targeting this plugin

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user inputs
  • Deploy database monitoring and alerting for unusual SQL queries

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Super Store Finder version. If version is below 6.9.8, you are vulnerable.

Check Version:

wp plugin get superstorefinder-wp --field=version

Verify Fix Applied:

Verify plugin version shows 6.9.8 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries in WordPress or database logs
  • Multiple failed login attempts or unusual user activity
  • Error logs showing SQL syntax errors

Network Indicators:

  • HTTP requests with SQL injection payloads to plugin endpoints
  • Unusual outbound database connections

SIEM Query:

source="wordpress.log" AND ("superstorefinder" OR "store-finder") AND ("union select" OR "sleep(" OR "benchmark(" OR "' OR '1'='1")

🔗 References

📤 Share & Export