CVE-2024-8621

9.9 CRITICAL

📋 TL;DR

This SQL injection vulnerability in the Daily Prayer Time WordPress plugin allows authenticated attackers with Contributor-level access or higher to execute arbitrary SQL queries. Attackers can extract sensitive database information like user credentials, plugin data, or other WordPress content. All WordPress sites using this plugin up to version 2024.08.26 are affected.

💻 Affected Systems

Products:
  • Daily Prayer Time for Mosques WordPress Plugin
Versions: All versions up to and including 2024.08.26
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin and at least one user with Contributor-level access or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including extraction of WordPress user credentials, sensitive plugin data, and potential privilege escalation to full site control.

🟠

Likely Case

Extraction of sensitive plugin data, user information, and potential data manipulation within the plugin's database tables.

🟢

If Mitigated

Limited impact if proper access controls restrict Contributor-level users and database permissions are properly configured.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but uses simple SQL injection techniques against a known vulnerable parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2024.08.26

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3151906/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Daily Prayer Time for Mosques'. 4. Click 'Update Now' if available, or manually update to latest version. 5. Verify plugin is updated to version newer than 2024.08.26.

🔧 Temporary Workarounds

Remove vulnerable shortcode usage

all

Identify and remove or disable any usage of the 'quran_verse' shortcode with 'max_word' parameter on your site

Restrict user roles

all

Temporarily restrict Contributor-level users from accessing or modifying content with shortcodes

🧯 If You Can't Patch

  • Disable the Daily Prayer Time plugin completely until patched
  • Implement strict WAF rules to block SQL injection patterns targeting the 'max_word' parameter

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Daily Prayer Time version. If version is 2024.08.26 or older, you are vulnerable.

Check Version:

wp plugin list --name='daily-prayer-time-for-mosques' --field=version

Verify Fix Applied:

After updating, verify plugin version is newer than 2024.08.26 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in WordPress or database logs containing 'max_word' parameter
  • Multiple failed login attempts followed by SQL error messages

Network Indicators:

  • HTTP POST requests to WordPress containing 'max_word' parameter with SQL injection patterns

SIEM Query:

source="wordpress.log" AND ("max_word" AND ("UNION" OR "SELECT" OR "FROM" OR "WHERE"))

🔗 References

📤 Share & Export