Skip to main content

CVE-2024-11267: CWE-89 SQL Injection in Unknown JSP Store Locator

High
VulnerabilityCVE-2024-11267cvecve-2024-11267cwe-89
Published: Thu May 15 2025 (05/15/2025, 20:06:48 UTC)
Source: CVE
Vendor/Project: Unknown
Product: JSP Store Locator

Description

The JSP Store Locator WordPress plugin through 1.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing user with Contributor to perform SQL injection attacks.

AI-Powered Analysis

AILast updated: 07/04/2025, 06:57:17 UTC

Technical Analysis

CVE-2024-11267 is a high-severity SQL Injection vulnerability (CWE-89) found in the JSP Store Locator WordPress plugin, specifically in versions up to 1.0. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input before incorporating it into SQL queries. This flaw allows an authenticated user with Contributor-level privileges to inject malicious SQL code. Exploiting this vulnerability can lead to unauthorized access to the underlying database, enabling attackers to read, modify, or delete sensitive data, escalate privileges, or disrupt the availability of the affected application. The CVSS 3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with the relatively low attack complexity and the requirement for only Contributor-level privileges without user interaction. Although no public exploits are currently known, the vulnerability poses a significant risk due to the widespread use of WordPress and the potential for privilege escalation from a low-level user role. The lack of available patches or updates at the time of publication increases the urgency for organizations to implement mitigating controls.

Potential Impact

For European organizations, this vulnerability could have severe consequences, particularly for businesses relying on WordPress-based e-commerce, retail, or location-based services that utilize the JSP Store Locator plugin. Successful exploitation could lead to data breaches involving customer information, intellectual property, or internal business data, resulting in regulatory non-compliance (e.g., GDPR violations), financial losses, reputational damage, and operational disruptions. The ability for a Contributor-level user to perform SQL injection attacks lowers the barrier for insider threats or compromised accounts to cause significant harm. Additionally, the potential for database manipulation or denial of service could impact service availability, affecting customer trust and business continuity. Given the critical nature of data protection regulations in Europe, organizations face heightened legal and financial risks if this vulnerability is exploited.

Mitigation Recommendations

1. Immediate action should include auditing WordPress installations to identify the presence of the JSP Store Locator plugin and verifying its version. 2. If the plugin is in use, restrict Contributor-level user permissions to the minimum necessary and monitor for suspicious activity. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the plugin's parameters. 4. Implement database-level protections such as least privilege access for the WordPress database user and enable query logging to detect anomalous queries. 5. Since no official patch is available, consider temporarily disabling or removing the plugin until a secure update is released. 6. Conduct regular security assessments and penetration testing focusing on WordPress plugins and user privilege configurations. 7. Educate administrators and users about the risks of privilege escalation and the importance of strong authentication and account management practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-11-15T17:51:09.131Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec1ab

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:57:17 AM

Last updated: 7/31/2025, 5:08:25 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats