Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10687: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in contest-gallery Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttons

0
Critical
VulnerabilityCVE-2024-10687cvecve-2024-10687cwe-89
Published: Tue Nov 05 2024 (11/05/2024, 09:30:59 UTC)
Source: CVE Database V5
Vendor/Project: contest-gallery
Product: Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttons

Description

CVE-2024-10687 is a critical SQL Injection vulnerability affecting the WordPress plugin 'Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttons' in all versions up to 24. 0. 3. The flaw arises from improper neutralization of special elements in the $collectedIds parameter, allowing unauthenticated attackers to perform time-based SQL Injection attacks. This enables attackers to append malicious SQL queries to extract sensitive database information, compromising confidentiality, integrity, and availability. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. Despite no known exploits in the wild yet, the high CVSS score of 9. 8 reflects its critical severity. Organizations using this plugin should prioritize patching or applying mitigations immediately to prevent data breaches and potential system compromise.

AI-Powered Analysis

AILast updated: 02/26/2026, 09:11:07 UTC

Technical Analysis

The vulnerability CVE-2024-10687 is a time-based SQL Injection (CWE-89) found in the WordPress plugin 'Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttons'. It affects all versions up to and including 24.0.3. The root cause is insufficient escaping and lack of prepared statements for the user-supplied parameter $collectedIds in SQL queries. This improper neutralization allows attackers to inject arbitrary SQL commands, which can be executed by the database engine. Since the injection is time-based, attackers can infer data by measuring response delays, enabling extraction of sensitive information such as user credentials, payment data, or other confidential records stored in the database. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk. The plugin is widely used in WordPress sites for contest galleries with social media integration and e-commerce features, making it a high-value target. No patches or official fixes have been published at the time of disclosure, and no known exploits have been reported in the wild, but the critical CVSS score of 9.8 indicates a severe threat.

Potential Impact

The impact of this vulnerability is severe for organizations using the affected WordPress plugin. Successful exploitation can lead to unauthorized disclosure of sensitive data, including user information, payment details, and internal application data, violating confidentiality. Attackers can also modify or delete data, impacting integrity, and potentially disrupt application functionality, affecting availability. Given the plugin’s role in e-commerce and social media contest management, data breaches could result in financial losses, reputational damage, regulatory penalties, and loss of customer trust. The unauthenticated and remote nature of the exploit increases the likelihood of automated attacks and mass exploitation attempts. Organizations with high-traffic WordPress sites or those handling sensitive customer data are particularly at risk. The lack of a patch increases exposure time, and the complexity of the plugin’s integration with payment and social platforms amplifies the potential damage.

Mitigation Recommendations

1. Immediately disable or restrict access to the vulnerable plugin until a patch is available. 2. Monitor web application logs for unusual SQL query patterns or time delays indicative of time-based SQL Injection attempts. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the $collectedIds parameter. 4. Use database activity monitoring tools to detect anomalous queries and prevent unauthorized data access. 5. Implement least privilege principles on the database user accounts used by the plugin to limit the scope of potential damage. 6. Regularly back up website and database data to enable recovery in case of compromise. 7. Once available, promptly apply official patches or updates from the plugin vendor. 8. Conduct thorough security assessments and code reviews of custom or third-party plugins before deployment. 9. Educate site administrators about the risks of installing unverified plugins and the importance of timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-11-01T15:03:30.968Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dfab7ef31ef0b5922ca

Added to database: 2/25/2026, 9:47:38 PM

Last enriched: 2/26/2026, 9:11:07 AM

Last updated: 2/26/2026, 10:27:08 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats