CVE-2025-24767

9.3 CRITICAL

📋 TL;DR

This SQL injection vulnerability in the TicketBAI Facturas para WooCommerce WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It affects all versions up to 3.19 of the plugin, potentially compromising WooCommerce stores using this Spanish tax compliance extension.

💻 Affected Systems

Products:
  • TicketBAI Facturas para WooCommerce WordPress plugin
Versions: All versions up to and including 3.19
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WooCommerce stores using this plugin for Spanish tax compliance (TicketBAI). Requires WordPress installation with the vulnerable plugin active.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to theft of customer data, payment information, administrative credentials, and potential website defacement or destruction.

🟠

Likely Case

Data exfiltration of customer information, order details, and potentially sensitive business data stored in the WordPress database.

🟢

If Mitigated

Limited impact if database permissions are properly restricted and web application firewalls block SQL injection patterns.

🌐 Internet-Facing: HIGH - WordPress plugins are typically exposed to the internet and this vulnerability allows unauthenticated exploitation.
🏢 Internal Only: MEDIUM - Internal systems running vulnerable versions could be compromised through internal attacks or lateral movement.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Blind SQL injection typically requires automated tools but is well-understood and easily weaponized. The vulnerability is publicly documented with technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 3.19

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wp-ticketbai/vulnerability/wordpress-ticketbai-facturas-para-woocommerce-3-19-sql-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'TicketBAI Facturas para WooCommerce'. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with SQL injection protection rules to block exploitation attempts.

Temporary Plugin Deactivation

linux

Disable the vulnerable plugin until patched, though this will break TicketBAI functionality.

wp plugin deactivate wp-ticketbai

🧯 If You Can't Patch

  • Implement strict database user permissions with minimal privileges for the WordPress database user.
  • Enable detailed SQL query logging and monitor for unusual database activity patterns.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → TicketBAI Facturas para WooCommerce version. If version is 3.19 or lower, you are vulnerable.

Check Version:

wp plugin get wp-ticketbai --field=version

Verify Fix Applied:

Verify plugin version is higher than 3.19 and test with SQL injection scanning tools like sqlmap (in safe, authorized testing only).

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in WordPress debug logs
  • Multiple failed SQL queries with similar patterns
  • Requests with SQL keywords in parameters

Network Indicators:

  • HTTP requests containing SQL syntax in GET/POST parameters to plugin endpoints
  • Unusual database connection patterns from web server

SIEM Query:

source="wordpress.log" AND ("SQL syntax" OR "mysql_error" OR "wpdb::prepare") AND "ticketbai"

🔗 References

📤 Share & Export