CVE-2024-9156

7.5 HIGH

📋 TL;DR

This SQL injection vulnerability in the TI WooCommerce Wishlist WordPress plugin allows unauthenticated attackers to execute arbitrary SQL queries. Attackers can extract sensitive information like user credentials, payment data, and other database contents. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • TI WooCommerce Wishlist WordPress Plugin
Versions: through 2.8.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Any WordPress installation with the TI WooCommerce Wishlist plugin enabled is vulnerable. The vulnerability exists in the plugin's SQL queries.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including admin credentials, customer PII, payment information, and potential site takeover via privilege escalation.

🟠

Likely Case

Data exfiltration of user information, email addresses, and potentially hashed passwords from the WordPress database.

🟢

If Mitigated

Limited information disclosure if database permissions are properly restricted and sensitive data is encrypted.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation makes all internet-facing WordPress sites with this plugin vulnerable.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but attack surface is reduced compared to internet-facing systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities in WordPress plugins are frequently weaponized. The unauthenticated nature and low complexity make this attractive to attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8.3 or later

Vendor Advisory: https://wpscan.com/vulnerability/e95974f9-1f68-4181-89b0-3559d61cfa93/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find TI WooCommerce Wishlist. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 2.8.3+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate ti-woocommerce-wishlist

Web Application Firewall Rule

all

Block SQL injection patterns targeting the wishlist plugin endpoints

Modify WAF to block requests containing SQL injection patterns to /wp-content/plugins/ti-woocommerce-wishlist/

🧯 If You Can't Patch

  • Implement strict database user permissions with minimal privileges
  • Deploy a web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → TI WooCommerce Wishlist → Version. If version is 2.8.2 or lower, you are vulnerable.

Check Version:

wp plugin get ti-woocommerce-wishlist --field=version

Verify Fix Applied:

Verify plugin version is 2.8.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple requests to wishlist endpoints with SQL-like parameters
  • 429 or 500 errors from wishlist plugin endpoints

Network Indicators:

  • POST/GET requests to /wp-content/plugins/ti-woocommerce-wishlist/ with SQL injection patterns
  • Unusual outbound database connections from web server

SIEM Query:

source="web_logs" AND (uri="/wp-content/plugins/ti-woocommerce-wishlist/*" AND (param="*UNION*" OR param="*SELECT*" OR param="*INSERT*" OR param="*DELETE*"))

🔗 References

📤 Share & Export