Skip to main content

CVE-2024-11372: CWE-89 SQL Injection in Unknown Connexion Logs

High
VulnerabilityCVE-2024-11372cvecve-2024-11372cwe-89
Published: Thu May 15 2025 (05/15/2025, 20:06:49 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Connexion Logs

Description

The Connexion Logs WordPress plugin through 3.0.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks

AI-Powered Analysis

AILast updated: 07/04/2025, 06:57:45 UTC

Technical Analysis

CVE-2024-11372 is a high-severity SQL Injection vulnerability (CWE-89) found in the WordPress plugin 'Connexion Logs' up to version 3.0.2. The vulnerability arises because the plugin fails to properly sanitize and escape a parameter before incorporating it into a SQL query. This improper handling allows an attacker with administrative privileges to inject arbitrary SQL code into the backend database queries. The CVSS 3.1 base score of 7.2 reflects the vulnerability's characteristics: it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), but requires high privileges (PR:H) and no user interaction (UI:N). The impact is significant, affecting confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected system. Exploiting this vulnerability could allow an attacker to read, modify, or delete sensitive data stored in the WordPress database, potentially leading to full site compromise, data leakage, or disruption of service. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a WordPress plugin—commonly used across many websites—makes it a critical concern for site administrators. The lack of an official patch or update at the time of publication increases the urgency for mitigation.

Potential Impact

For European organizations, the impact of CVE-2024-11372 can be substantial, especially for those relying on WordPress sites with the Connexion Logs plugin installed. Compromise of administrative accounts through SQL injection can lead to unauthorized access to sensitive customer data, intellectual property, or internal communications, violating GDPR and other data protection regulations. The integrity of website content and logs can be manipulated, undermining trust and operational reliability. Availability may also be affected if attackers delete or corrupt database records, causing downtime or loss of critical functionality. Organizations in sectors such as finance, healthcare, e-commerce, and government are particularly at risk due to the sensitivity of their data and regulatory scrutiny. Additionally, exploitation could be leveraged as a foothold for further lateral movement within corporate networks, amplifying the threat.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should take immediate steps beyond generic patching advice: 1) Audit all WordPress installations to identify the presence of the Connexion Logs plugin and its version. 2) Restrict administrative access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 3) Implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable parameter. 4) Employ database query parameterization or prepared statements where possible, and review plugin code if custom modifications exist. 5) Monitor logs for unusual database query patterns or unexpected administrative actions. 6) If no official patch is available, consider temporarily disabling or removing the plugin until a secure version is released. 7) Conduct regular backups of WordPress databases and files to enable rapid recovery in case of compromise. 8) Educate site administrators about the risks of SQL injection and safe plugin management practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-11-18T19:27:28.550Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec1ba

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:57:45 AM

Last updated: 8/18/2025, 11:31:03 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats