CVE-2024-7150
📋 TL;DR
This vulnerability allows authenticated WordPress users with Contributor-level access or higher to perform time-based SQL injection attacks through the Slider by 10Web plugin. Attackers can extract sensitive database information by manipulating the 'id' parameter. All WordPress sites using vulnerable versions of this plugin are affected.
💻 Affected Systems
- Slider by 10Web – Responsive Image Slider WordPress plugin
📦 What is this software?
Slider by 10web
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including extraction of user credentials, sensitive content, and potentially privilege escalation to full site control.
Likely Case
Data exfiltration of sensitive information from WordPress database tables including user data, posts, and plugin-specific information.
If Mitigated
Limited impact if proper access controls and network segmentation are in place, though database information could still be exposed.
🎯 Exploit Status
Time-based SQL injection requires authentication but is straightforward to exploit with basic SQL knowledge.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.2.58 or later
Vendor Advisory: https://wordpress.org/plugins/slider-wd/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Slider by 10Web' and click 'Update Now'. 4. Verify plugin version is 1.2.58 or higher.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the Slider by 10Web plugin until patched
wp plugin deactivate slider-wd
Restrict user roles
allLimit Contributor and higher roles to trusted users only
🧯 If You Can't Patch
- Remove Contributor and higher roles from untrusted users
- Implement web application firewall with SQL injection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Slider by 10Web version number
Check Version:
wp plugin get slider-wd --field=version
Verify Fix Applied:
Confirm plugin version is 1.2.58 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in WordPress debug logs
- Multiple requests with varying 'id' parameters and timing patterns
Network Indicators:
- Repeated POST requests to slider-wd endpoints with SQL-like payloads
SIEM Query:
source="wordpress" AND (uri_path="*slider-wd*" AND (query_string="*SLEEP*" OR query_string="*BENCHMARK*" OR query_string="*WAITFOR*"))
🔗 References
- https://plugins.trac.wordpress.org/browser/slider-wd/tags/1.2.57/frontend/models/WDSModelSlider.php#L6
- https://plugins.trac.wordpress.org/changeset/3131688/
- https://wordpress.org/plugins/slider-wd/#developers
- https://www.wordfence.com/threat-intel/vulnerabilities/id/74d635b6-2b4a-49af-af5c-6bfa1b5d220e?source=cve