Skip to main content

CVE-2021-24786: CWE-89 SQL Injection in Unknown Download Monitor

High
VulnerabilityCVE-2021-24786cvecve-2021-24786cwe-89
Published: Mon Jan 03 2022 (01/03/2022, 12:49:03 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Download Monitor

Description

The Download Monitor WordPress plugin before 4.4.5 does not properly validate and escape the "orderby" GET parameter before using it in a SQL statement when viewing the logs, leading to an SQL Injection issue

AI-Powered Analysis

AILast updated: 07/08/2025, 06:28:29 UTC

Technical Analysis

CVE-2021-24786 is a high-severity SQL Injection vulnerability affecting the Download Monitor WordPress plugin versions prior to 4.4.5. The vulnerability arises because the plugin does not properly validate or escape the 'orderby' GET parameter when viewing logs, which is subsequently used directly in a SQL query. This improper sanitization allows an attacker with at least high-level privileges (PR:H) to inject arbitrary SQL commands into the database query. The vulnerability has a CVSS 3.1 score of 7.2, reflecting its high impact on confidentiality, integrity, and availability. Exploiting this flaw could allow an attacker to read sensitive data, modify or delete database records, or disrupt the availability of the plugin’s functionality. Although no known exploits are currently reported in the wild, the vulnerability's presence in a widely used WordPress plugin makes it a notable risk. The attack vector is network-based (AV:N), does not require user interaction (UI:N), but does require the attacker to have authenticated access with high privileges (PR:H), which limits exploitation to users with elevated permissions on the WordPress site. The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. The root cause is a classic CWE-89 SQL Injection due to insufficient input validation and escaping of user-supplied parameters in SQL statements. The lack of a patch link suggests that users should upgrade to version 4.4.5 or later where this issue is fixed.

Potential Impact

For European organizations using WordPress sites with the Download Monitor plugin, this vulnerability could lead to significant data breaches or service disruptions. Attackers with high-level access could exploit the SQL Injection to extract sensitive information such as user data, download logs, or configuration details, potentially violating GDPR regulations and resulting in legal and financial penalties. Integrity of data could be compromised by unauthorized modification or deletion of records, impacting business operations and trustworthiness of the website. Availability could also be affected if attackers execute destructive SQL commands, causing denial of service. Since exploitation requires authenticated high privileges, the threat is particularly relevant for organizations with multiple administrators or contributors, where insider threats or compromised admin accounts could be leveraged. The vulnerability could also be used as a foothold for further lateral movement or privilege escalation within the web application environment. Given the widespread use of WordPress in Europe across sectors such as e-commerce, media, and government, the impact could be broad if not mitigated promptly.

Mitigation Recommendations

European organizations should immediately verify the version of the Download Monitor plugin installed on their WordPress sites and upgrade to version 4.4.5 or later where the vulnerability is patched. In addition, implement strict access control policies to limit the number of users with high-level privileges to the minimum necessary. Conduct regular audits of user accounts and permissions to detect and remove unnecessary or suspicious admin accounts. Employ Web Application Firewalls (WAFs) configured to detect and block SQL Injection attempts, including those targeting the 'orderby' parameter. Enable detailed logging and monitoring of administrative actions and unusual query patterns to quickly identify exploitation attempts. Consider implementing input validation and sanitization at the application level as an additional safeguard. Regularly back up website data and databases to enable recovery in case of compromise. Finally, educate administrators and developers about secure coding practices and the risks of SQL Injection vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2021-01-14T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f725b0acd01a2492647b4

Added to database: 5/22/2025, 6:52:11 PM

Last enriched: 7/8/2025, 6:28:29 AM

Last updated: 8/12/2025, 2:20:05 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats