CVE-2024-13320: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in villatheme CURCY - WooCommerce Multi Currency - Currency Switcher
CVE-2024-13320 is a high-severity SQL Injection vulnerability in the CURCY - WooCommerce Multi Currency - Currency Switcher WordPress plugin, affecting all versions up to 2. 3. 6. It arises from improper neutralization of special elements in the 'wc_filter_price_meta[where]' parameter, allowing unauthenticated attackers to inject malicious SQL queries. Exploitation can lead to unauthorized extraction of sensitive database information without requiring user interaction or authentication. The vulnerability has a CVSS score of 7. 5, indicating a significant risk to confidentiality. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress e-commerce sites should prioritize patching or applying mitigations to prevent data breaches. Countries with widespread WooCommerce usage and e-commerce activity are most at risk.
AI Analysis
Technical Summary
CVE-2024-13320 is a SQL Injection vulnerability identified in the CURCY - WooCommerce Multi Currency - Currency Switcher plugin for WordPress, specifically affecting all versions up to and including 2.3.6. The root cause is insufficient escaping and lack of proper preparation of the 'wc_filter_price_meta[where]' parameter, which is user-supplied and incorporated directly into SQL queries. This improper neutralization of special elements (CWE-89) enables unauthenticated attackers to append arbitrary SQL commands to existing queries. As a result, attackers can extract sensitive information from the underlying database, compromising confidentiality without affecting integrity or availability. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS 3.1 base score of 7.5 reflects the ease of exploitation (low attack complexity), no privileges required, and high confidentiality impact. Although no public exploits are currently known, the widespread use of WooCommerce and this plugin in e-commerce environments elevates the risk. The vulnerability highlights the importance of proper input validation, parameterized queries, and escaping in WordPress plugin development to prevent injection attacks.
Potential Impact
The primary impact of CVE-2024-13320 is unauthorized disclosure of sensitive data stored in the WordPress site's database, which may include customer information, transaction details, and other confidential business data. This can lead to privacy violations, regulatory non-compliance, reputational damage, and potential financial losses. Since the vulnerability does not affect integrity or availability, attackers cannot modify or delete data or disrupt service directly, but the exposure of sensitive data alone can have severe consequences. Organizations running e-commerce sites with this plugin are at risk of data breaches that could undermine customer trust and invite legal penalties. The ease of exploitation without authentication increases the threat level, making automated scanning and mass exploitation plausible if an exploit becomes publicly available. Additionally, attackers could use extracted data to facilitate further attacks such as phishing or credential stuffing. The vulnerability's presence in a popular WordPress plugin amplifies its potential impact globally.
Mitigation Recommendations
To mitigate CVE-2024-13320, organizations should immediately update the CURCY - WooCommerce Multi Currency - Currency Switcher plugin to a patched version once available. In the absence of an official patch, administrators should consider temporarily disabling the plugin to eliminate exposure. Applying Web Application Firewall (WAF) rules that detect and block SQL injection patterns targeting the 'wc_filter_price_meta[where]' parameter can provide interim protection. Developers and site administrators should audit custom code and plugin configurations to ensure all user inputs are properly sanitized and parameterized before database queries. Employing principle of least privilege on database accounts limits the potential damage from successful injection. Regularly monitoring logs for suspicious query patterns and unusual database access can help detect exploitation attempts early. Finally, organizations should maintain up-to-date backups and have an incident response plan to address potential data breaches stemming from this vulnerability.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-13320: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in villatheme CURCY - WooCommerce Multi Currency - Currency Switcher
Description
CVE-2024-13320 is a high-severity SQL Injection vulnerability in the CURCY - WooCommerce Multi Currency - Currency Switcher WordPress plugin, affecting all versions up to 2. 3. 6. It arises from improper neutralization of special elements in the 'wc_filter_price_meta[where]' parameter, allowing unauthenticated attackers to inject malicious SQL queries. Exploitation can lead to unauthorized extraction of sensitive database information without requiring user interaction or authentication. The vulnerability has a CVSS score of 7. 5, indicating a significant risk to confidentiality. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress e-commerce sites should prioritize patching or applying mitigations to prevent data breaches. Countries with widespread WooCommerce usage and e-commerce activity are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-13320 is a SQL Injection vulnerability identified in the CURCY - WooCommerce Multi Currency - Currency Switcher plugin for WordPress, specifically affecting all versions up to and including 2.3.6. The root cause is insufficient escaping and lack of proper preparation of the 'wc_filter_price_meta[where]' parameter, which is user-supplied and incorporated directly into SQL queries. This improper neutralization of special elements (CWE-89) enables unauthenticated attackers to append arbitrary SQL commands to existing queries. As a result, attackers can extract sensitive information from the underlying database, compromising confidentiality without affecting integrity or availability. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS 3.1 base score of 7.5 reflects the ease of exploitation (low attack complexity), no privileges required, and high confidentiality impact. Although no public exploits are currently known, the widespread use of WooCommerce and this plugin in e-commerce environments elevates the risk. The vulnerability highlights the importance of proper input validation, parameterized queries, and escaping in WordPress plugin development to prevent injection attacks.
Potential Impact
The primary impact of CVE-2024-13320 is unauthorized disclosure of sensitive data stored in the WordPress site's database, which may include customer information, transaction details, and other confidential business data. This can lead to privacy violations, regulatory non-compliance, reputational damage, and potential financial losses. Since the vulnerability does not affect integrity or availability, attackers cannot modify or delete data or disrupt service directly, but the exposure of sensitive data alone can have severe consequences. Organizations running e-commerce sites with this plugin are at risk of data breaches that could undermine customer trust and invite legal penalties. The ease of exploitation without authentication increases the threat level, making automated scanning and mass exploitation plausible if an exploit becomes publicly available. Additionally, attackers could use extracted data to facilitate further attacks such as phishing or credential stuffing. The vulnerability's presence in a popular WordPress plugin amplifies its potential impact globally.
Mitigation Recommendations
To mitigate CVE-2024-13320, organizations should immediately update the CURCY - WooCommerce Multi Currency - Currency Switcher plugin to a patched version once available. In the absence of an official patch, administrators should consider temporarily disabling the plugin to eliminate exposure. Applying Web Application Firewall (WAF) rules that detect and block SQL injection patterns targeting the 'wc_filter_price_meta[where]' parameter can provide interim protection. Developers and site administrators should audit custom code and plugin configurations to ensure all user inputs are properly sanitized and parameterized before database queries. Employing principle of least privilege on database accounts limits the potential damage from successful injection. Regularly monitoring logs for suspicious query patterns and unusual database access can help detect exploitation attempts early. Finally, organizations should maintain up-to-date backups and have an incident response plan to address potential data breaches stemming from this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-09T22:31:25.382Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e4eb7ef31ef0b59ca96
Added to database: 2/25/2026, 9:49:02 PM
Last enriched: 2/26/2026, 1:42:01 AM
Last updated: 2/26/2026, 8:06:26 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.