CVE-2024-8436

9.9 CRITICAL

📋 TL;DR

This SQL injection vulnerability in the WP Easy Gallery WordPress plugin allows authenticated attackers with subscriber-level access or higher to execute arbitrary SQL queries. Attackers can extract sensitive information from the database, including user credentials and other confidential data. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • WP Easy Gallery – WordPress Gallery Plugin
Versions: All versions up to and including 4.8.5
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with subscriber-level access or higher

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to credential theft, data exfiltration, privilege escalation, and potential site takeover.

🟠

Likely Case

Extraction of sensitive user data, administrative credentials, and other database contents.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but uses common SQL injection techniques

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.8.6 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/wp-easy-gallery/trunk/wp-easy-gallery.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find WP Easy Gallery plugin
4. Click 'Update Now' if available
5. If no update available, deactivate and delete the plugin

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Deactivate the WP Easy Gallery plugin to prevent exploitation

wp plugin deactivate wp-easy-gallery

Restrict user access

all

Limit subscriber-level access to sensitive areas

🧯 If You Can't Patch

  • Deactivate and remove the WP Easy Gallery plugin immediately
  • Implement web application firewall rules to block SQL injection patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for WP Easy Gallery version 4.8.5 or earlier

Check Version:

wp plugin get wp-easy-gallery --field=version

Verify Fix Applied:

Verify plugin version is 4.8.6 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries from authenticated users
  • Multiple failed SQL injection attempts
  • Suspicious POST requests to gallery endpoints

Network Indicators:

  • SQL syntax in HTTP parameters
  • Unusual database connection patterns

SIEM Query:

source="web_logs" AND ("edit_imageId" OR "edit_imageDelete") AND (sql OR union OR select)

🔗 References

📤 Share & Export