CVE-2024-5605
📋 TL;DR
The Media Library Assistant WordPress plugin contains a time-based SQL injection vulnerability in the 'order' parameter of the mla_tag_cloud shortcode. Authenticated attackers with contributor-level access or higher can exploit this to extract sensitive information from the database. All versions up to and including 3.16 are affected.
💻 Affected Systems
- Media Library Assistant WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers extract sensitive data including user credentials, personal information, and database contents, potentially leading to complete site compromise.
Likely Case
Attackers extract user data, plugin settings, and potentially escalate privileges through extracted credentials.
If Mitigated
With proper access controls and monitoring, impact is limited to data exposure from the WordPress database.
🎯 Exploit Status
Exploitation requires authenticated access but uses standard SQL injection techniques
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.17
Vendor Advisory: https://wordpress.org/plugins/media-library-assistant/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Media Library Assistant. 4. Click 'Update Now' if available. 5. Alternatively, download version 3.17+ from WordPress plugin repository and manually update.
🔧 Temporary Workarounds
Disable vulnerable shortcode
allRemove or disable the mla_tag_cloud shortcode from posts/pages
Restrict contributor access
allTemporarily restrict contributor-level users from accessing the site
🧯 If You Can't Patch
- Implement strict WAF rules to block SQL injection patterns
- Monitor for unusual database queries from authenticated users
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin under Plugins > Installed Plugins
Check Version:
wp plugin list --name='Media Library Assistant' --field=version
Verify Fix Applied:
Confirm Media Library Assistant plugin version is 3.17 or higher
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries containing 'ORDER BY' with time delays
- Multiple failed login attempts followed by SQL queries
Network Indicators:
- HTTP POST requests to WordPress with 'order' parameter containing SQL syntax
SIEM Query:
source="wordpress.log" AND "mla_tag_cloud" AND ("ORDER BY" OR "SLEEP" OR "BENCHMARK")
🔗 References
- https://plugins.trac.wordpress.org/browser/media-library-assistant/trunk/includes/class-mla-shortcode-support.php#L2783
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3098232%40media-library-assistant&new=3098232%40media-library-assistant&sfp_email=&sfph_mail=
- https://wordpress.org/plugins/media-library-assistant/#developers
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3ba8a9f5-0633-4cf0-af27-5466d93e9020?source=cve
- https://plugins.trac.wordpress.org/browser/media-library-assistant/trunk/includes/class-mla-shortcode-support.php#L2783
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3098232%40media-library-assistant&new=3098232%40media-library-assistant&sfp_email=&sfph_mail=
- https://wordpress.org/plugins/media-library-assistant/#developers
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3ba8a9f5-0633-4cf0-af27-5466d93e9020?source=cve