CVE-2024-8625

7.2 HIGH

📋 TL;DR

The TS Poll WordPress plugin before version 2.4.0 contains a SQL injection vulnerability that allows authenticated administrators to execute arbitrary SQL commands. This affects WordPress sites using vulnerable versions of the TS Poll plugin. Attackers with admin access can potentially compromise the database.

💻 Affected Systems

Products:
  • TS Poll WordPress Plugin
Versions: All versions before 2.4.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress administrator access to exploit; affects all WordPress installations with vulnerable plugin versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full database compromise including data theft, modification, or deletion; potential privilege escalation to full site control; possible server compromise if database permissions allow file system access.

🟠

Likely Case

Data exfiltration from WordPress database, modification of site content, creation of backdoor admin accounts, or installation of malicious plugins/themes.

🟢

If Mitigated

Limited impact if proper access controls restrict admin accounts and database permissions are minimized; SQL injection attempts would be logged and detected.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires WordPress administrator credentials; SQL injection is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.0

Vendor Advisory: https://wpscan.com/vulnerability/ab4d7065-4ea2-4233-9593-0f540f91f45e/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find TS Poll plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 2.4.0+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable TS Poll Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate ts-poll

Restrict Admin Access

all

Implement strict access controls for WordPress administrator accounts

🧯 If You Can't Patch

  • Remove admin access from untrusted users and implement multi-factor authentication
  • Implement web application firewall rules to block SQL injection patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → TS Poll version number; if version is below 2.4.0, system is vulnerable.

Check Version:

wp plugin get ts-poll --field=version

Verify Fix Applied:

Verify TS Poll plugin version is 2.4.0 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in WordPress or database logs
  • Multiple failed login attempts followed by successful admin login
  • Unexpected plugin file modifications

Network Indicators:

  • HTTP POST requests to TS Poll admin endpoints with SQL payloads
  • Unusual database connection patterns from web server

SIEM Query:

source="wordpress.log" AND "ts-poll" AND ("SELECT" OR "UNION" OR "INSERT" OR "UPDATE" OR "DELETE")

🔗 References

📤 Share & Export