Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12428: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in peterschulznl WP Data Access – App, Table, Form and Chart Builder plugin

0
High
VulnerabilityCVE-2024-12428cvecve-2024-12428cwe-89
Published: Wed Dec 25 2024 (12/25/2024, 04:22:04 UTC)
Source: CVE Database V5
Vendor/Project: peterschulznl
Product: WP Data Access – App, Table, Form and Chart Builder plugin

Description

CVE-2024-12428 is a high-severity SQL Injection vulnerability in the WP Data Access – App, Table, Form and Chart Builder plugin for WordPress, affecting all versions up to 5. 5. 22. It arises from improper sanitization of the 'order[user_login][dir]' parameter, allowing unauthenticated attackers to inject malicious SQL code. This flaw enables attackers to extract sensitive database information without requiring authentication or user interaction. Although no known exploits are currently reported in the wild, the vulnerability's ease of exploitation and potential impact on confidentiality make it a significant risk. Organizations using this plugin should prioritize patching or applying mitigations immediately. The threat primarily affects WordPress sites globally, with heightened risk in countries with large WordPress user bases and critical web infrastructure. Mitigation involves updating the plugin once a patch is released, employing web application firewalls with custom rules, and restricting access to vulnerable endpoints. The vulnerability has a CVSS score of 7.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:41:22 UTC

Technical Analysis

CVE-2024-12428 is an SQL Injection vulnerability identified in the WP Data Access – App, Table, Form and Chart Builder plugin for WordPress, maintained by peterschulznl. The vulnerability exists in all plugin versions up to and including 5.5.22 due to improper neutralization of special elements in the 'order[user_login][dir]' parameter. Specifically, the plugin fails to sufficiently escape user-supplied input and does not properly prepare SQL queries, allowing attackers to append arbitrary SQL commands. This flaw enables unauthenticated remote attackers to manipulate SQL queries executed by the plugin, potentially extracting sensitive information from the underlying database. The vulnerability is classified under CWE-89, indicating improper input validation leading to SQL Injection. The CVSS v3.1 score is 7.5 (High), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity or availability impact (I:N/A:N). No public exploits have been reported yet, but the vulnerability's characteristics make it exploitable remotely without authentication or user interaction. The plugin is widely used in WordPress environments for building apps, tables, forms, and charts, making the vulnerability relevant to many websites relying on this plugin for data access and presentation.

Potential Impact

The primary impact of CVE-2024-12428 is unauthorized disclosure of sensitive information from the WordPress site's database. Attackers exploiting this vulnerability can extract user credentials, personal data, or other confidential information stored in the database. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely by any attacker scanning for vulnerable sites. This can lead to data breaches, loss of customer trust, regulatory penalties, and potential further attacks leveraging the stolen data. The integrity and availability of the system are not directly affected, but confidentiality compromise alone can have severe consequences. Organizations running WordPress sites with this plugin are at risk of data leakage, especially if the database contains sensitive or regulated information. The widespread use of WordPress globally increases the potential attack surface, making this vulnerability a significant threat to many organizations, including small businesses, e-commerce sites, and enterprises relying on the plugin for data management.

Mitigation Recommendations

1. Monitor the vendor's official channels for a security patch and apply it immediately once available to remediate the vulnerability. 2. Until a patch is released, implement a Web Application Firewall (WAF) with custom rules to detect and block SQL Injection attempts targeting the 'order[user_login][dir]' parameter. 3. Restrict access to the plugin's endpoints by IP whitelisting or authentication where feasible to reduce exposure. 4. Conduct a thorough audit of database logs and web server logs to detect any suspicious activity or exploitation attempts. 5. Employ input validation and sanitization at the application level if custom code interacts with the plugin or its parameters. 6. Regularly back up databases and ensure backups are secure to enable recovery in case of compromise. 7. Educate site administrators about the risks of using outdated plugins and the importance of timely updates. 8. Consider temporarily disabling the plugin if it is not critical to site operations until a fix is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-10T16:50:28.718Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e3bb7ef31ef0b598985

Added to database: 2/25/2026, 9:48:43 PM

Last enriched: 2/26/2026, 3:41:22 AM

Last updated: 2/26/2026, 10:37:55 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats