CVE-2024-8379

7.2 HIGH

📋 TL;DR

This SQL injection vulnerability in the Cost Calculator Builder WordPress plugin allows authenticated users with Admin role or higher to execute arbitrary SQL commands. Attackers could read, modify, or delete database content, potentially compromising the entire WordPress site. All WordPress installations using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Cost Calculator Builder WordPress plugin
Versions: All versions before 3.2.29
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin. Admin role access is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, site defacement, privilege escalation to WordPress super admin, or full site takeover via webshell deployment.

🟠

Likely Case

Data exfiltration of sensitive information (user credentials, payment data, personal information), database corruption, or privilege escalation within WordPress.

🟢

If Mitigated

Limited impact if proper network segmentation, database user privilege restrictions, and regular backups are in place, though some data exposure may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with Admin privileges. SQL injection is well-understood with many available tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.29

Vendor Advisory: https://wpscan.com/vulnerability/a3463d5a-8215-4958-a6c0-039681c35a50/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Cost Calculator Builder' and check if version is below 3.2.29. 4. Click 'Update Now' if available, or manually download version 3.2.29+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate cost-calculator-builder

Database User Privilege Restriction

linux

Limit WordPress database user to SELECT, INSERT, UPDATE, DELETE only

REVOKE DROP, CREATE, ALTER ON wordpress.* FROM 'wpuser'@'localhost';

🧯 If You Can't Patch

  • Remove Admin role from untrusted users and implement principle of least privilege
  • Implement web application firewall (WAF) with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Cost Calculator Builder version. If version is below 3.2.29, you are vulnerable.

Check Version:

wp plugin get cost-calculator-builder --field=version

Verify Fix Applied:

Verify plugin version shows 3.2.29 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by successful Admin login
  • Unexpected plugin file modifications

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with SQL-like parameters
  • Unusual outbound database connections

SIEM Query:

source="wordpress.log" AND "cost-calculator-builder" AND ("admin-ajax" OR "action=update_options")

🔗 References

📤 Share & Export