CVE-2025-24664

9.3 CRITICAL

📋 TL;DR

This SQL injection vulnerability in the Eniture Technology LTL Freight Quotes WordPress plugin allows attackers to execute arbitrary SQL commands on the database. All WordPress sites using the Worldwide Express Edition of this plugin from any version through 5.0.20 are affected. Attackers can potentially access, modify, or delete sensitive data.

💻 Affected Systems

Products:
  • Eniture Technology LTL Freight Quotes – Worldwide Express Edition WordPress Plugin
Versions: n/a through 5.0.20
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Worldwide Express Edition of the plugin. Requires WordPress installation with the vulnerable plugin activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, privilege escalation, and full system takeover via subsequent attacks.

🟠

Likely Case

Unauthorized data access including sensitive customer information, shipping data, and potentially WordPress user credentials.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database user privilege restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized. The CVSS score of 9.3 suggests high exploitability with low attack complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.0.21 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/ltl-freight-quotes-worldwide-express-edition/vulnerability/wordpress-ltl-freight-quotes-plugin-5-0-20-sql-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'LTL Freight Quotes – Worldwide Express Edition'. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate ltl-freight-quotes-worldwide-express-edition

Web Application Firewall Rules

all

Implement WAF rules to block SQL injection patterns targeting this plugin

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user inputs
  • Apply principle of least privilege to database user accounts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → LTL Freight Quotes plugin version. If version is 5.0.20 or earlier, you are vulnerable.

Check Version:

wp plugin get ltl-freight-quotes-worldwide-express-edition --field=version

Verify Fix Applied:

Verify plugin version is 5.0.21 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries in WordPress or MySQL logs
  • Multiple failed login attempts or unusual admin activity
  • SQL error messages containing plugin-related table names

Network Indicators:

  • Unusual POST requests to plugin-specific endpoints
  • SQL injection patterns in HTTP requests

SIEM Query:

source="wordpress.log" AND "ltl-freight" AND ("sql" OR "database" OR "union" OR "select")

🔗 References

📤 Share & Export