Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12607: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in dasinfomedia School Management System for Wordpress

0
Medium
VulnerabilityCVE-2024-12607cvecve-2024-12607cwe-89
Published: Fri Mar 07 2025 (03/07/2025, 08:21:20 UTC)
Source: CVE Database V5
Vendor/Project: dasinfomedia
Product: School Management System for Wordpress

Description

CVE-2024-12607 is a medium severity SQL Injection vulnerability in the dasinfomedia School Management System plugin for WordPress, affecting all versions up to 92. 0. 0. The flaw exists in the 'id' parameter of the 'mj_smgt_show_event_task' AJAX action, where insufficient input sanitization allows authenticated users with Custom-level access or higher to inject malicious SQL code. Exploitation does not require user interaction but does require authentication with at least limited privileges. Successful exploitation can lead to unauthorized disclosure of sensitive database information, impacting confidentiality but not integrity or availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent data leakage. Countries with significant WordPress usage and educational institutions using this plugin are at higher risk. The vulnerability has a CVSS score of 6.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:28:43 UTC

Technical Analysis

CVE-2024-12607 is an SQL Injection vulnerability identified in the dasinfomedia School Management System plugin for WordPress, affecting all versions up to and including 92.0.0. The vulnerability arises from improper neutralization of special elements in the 'id' parameter of the 'mj_smgt_show_event_task' AJAX action. Specifically, the plugin fails to properly escape or prepare the SQL query that incorporates this user-supplied parameter, allowing an authenticated attacker with Custom-level access or higher to append arbitrary SQL commands to the existing query. This can be exploited to extract sensitive information from the underlying database, such as user data, credentials, or other confidential records stored by the school management system. The vulnerability requires authentication, which limits exposure to internal or semi-trusted users, but does not require any user interaction beyond sending crafted requests. The flaw does not affect data integrity or availability, focusing primarily on confidentiality breaches. The CVSS v3.1 base score is 6.5, reflecting network attack vector, low attack complexity, privileges required, no user interaction, and high confidentiality impact. No patches or official fixes have been linked yet, and no known exploits have been reported in the wild as of the publication date. The vulnerability is categorized under CWE-89, which covers SQL Injection issues due to improper input validation and query construction.

Potential Impact

The primary impact of CVE-2024-12607 is unauthorized disclosure of sensitive information stored in the database of affected WordPress sites using the dasinfomedia School Management System plugin. Attackers with at least Custom-level authenticated access can leverage this flaw to extract confidential data such as student records, staff information, schedules, and potentially credentials or other sensitive metadata. This breach of confidentiality can lead to privacy violations, regulatory non-compliance (e.g., FERPA in the US, GDPR in Europe), and reputational damage for educational institutions. While the vulnerability does not allow modification or deletion of data, the exposure of sensitive information can facilitate further attacks, including social engineering or privilege escalation. The requirement for authentication reduces the risk from external attackers but raises concerns about insider threats or compromised accounts. Organizations worldwide that rely on this plugin for managing school data are at risk, especially those with many users having Custom-level or higher privileges. The lack of known exploits in the wild suggests limited active exploitation currently, but the vulnerability's presence in a widely used CMS plugin makes it a significant concern for educational institutions and managed WordPress hosting providers.

Mitigation Recommendations

To mitigate CVE-2024-12607, organizations should first check for and apply any official patches or updates released by dasinfomedia as soon as they become available. In the absence of patches, administrators should restrict the number of users with Custom-level or higher privileges to the minimum necessary and enforce strong authentication and account monitoring to detect suspicious activity. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL Injection patterns targeting the 'mj_smgt_show_event_task' AJAX action can provide temporary protection. Code-level mitigations include reviewing and modifying the plugin’s source code to use prepared statements with parameterized queries for all database interactions involving user input, especially the 'id' parameter. Additionally, input validation and sanitization should be enforced to reject or safely handle unexpected characters. Regular database backups and monitoring for unusual query patterns or data access can help detect exploitation attempts. Finally, educating users about the risks of privilege misuse and maintaining strict access controls will reduce the likelihood of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-13T13:44:16.619Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e44b7ef31ef0b59c034

Added to database: 2/25/2026, 9:48:52 PM

Last enriched: 2/26/2026, 3:28:43 AM

Last updated: 2/26/2026, 6:35:53 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats