CVE-2024-13369: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in GoodLayers Tour Master - Tour Booking, Travel, Hotel
CVE-2024-13369 is a medium severity SQL Injection vulnerability in the WordPress plugin Tour Master - Tour Booking, Travel, Hotel, affecting all versions up to 5. 3. 6. The flaw exists due to improper sanitization of the 'review_id' parameter, allowing authenticated users with Subscriber-level access or higher to perform time-based SQL injection attacks. Exploitation enables attackers to append malicious SQL queries to extract sensitive database information without requiring user interaction. The vulnerability does not affect system availability or integrity but poses a significant confidentiality risk. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized data disclosure. Countries with high WordPress usage and tourism-related businesses are most at risk. The CVSS score is 6.
AI Analysis
Technical Summary
CVE-2024-13369 is a time-based SQL Injection vulnerability identified in the WordPress plugin Tour Master - Tour Booking, Travel, Hotel, affecting all versions up to and including 5.3.6. The vulnerability arises from improper neutralization of special elements in the 'review_id' parameter, which is insufficiently escaped and inadequately prepared in SQL queries. This flaw allows authenticated attackers with at least Subscriber-level privileges to inject additional SQL commands into existing queries. The injection is time-based, enabling attackers to infer data by measuring response delays, thus extracting sensitive information from the backend database. The vulnerability does not require user interaction but does require authentication, limiting the attack surface to users with some level of access. The plugin is widely used in WordPress sites related to travel, hotel booking, and tour management, making the vulnerability relevant to organizations in the tourism sector. The CVSS 3.1 base score is 6.5, indicating a medium severity level, with a vector showing network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No public exploits have been reported yet, but the vulnerability poses a risk of sensitive data disclosure if exploited.
Potential Impact
The primary impact of CVE-2024-13369 is unauthorized disclosure of sensitive information stored in the backend database of affected WordPress sites using the Tour Master plugin. Attackers with Subscriber-level access can exploit the vulnerability to extract data such as user details, booking information, and potentially payment or personal data, depending on the database schema. Although the vulnerability does not affect data integrity or availability, the confidentiality breach can lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential financial losses. Organizations operating in the travel and hospitality sectors, which often handle sensitive customer data, are particularly at risk. The requirement for authentication limits exploitation to insiders or compromised accounts, but this does not eliminate the threat, especially in environments with weak access controls or credential reuse. The absence of known exploits in the wild suggests limited current exploitation, but the vulnerability's medium severity and ease of exploitation warrant prompt remediation to prevent future attacks.
Mitigation Recommendations
To mitigate CVE-2024-13369, organizations should immediately update the Tour Master plugin to a patched version once released by GoodLayers. Until a patch is available, implement the following specific measures: 1) Restrict Subscriber-level user permissions to the minimum necessary, removing unnecessary access to the vulnerable functionality; 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'review_id' parameter; 3) Conduct thorough code reviews and apply manual input validation and parameterized queries or prepared statements in the plugin code if possible; 4) Monitor logs for unusual database query patterns or delays indicative of time-based SQL injection attempts; 5) Enforce strong authentication and credential hygiene to reduce the risk of account compromise; 6) Isolate the WordPress environment and database with strict network segmentation to limit lateral movement in case of exploitation; 7) Regularly back up databases and test restoration procedures to mitigate potential data loss from future incidents. These targeted actions go beyond generic advice by focusing on the specific vulnerable parameter, user roles, and plugin context.
Affected Countries
United States, India, United Kingdom, Germany, Australia, Canada, France, Brazil, Japan, Italy
CVE-2024-13369: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in GoodLayers Tour Master - Tour Booking, Travel, Hotel
Description
CVE-2024-13369 is a medium severity SQL Injection vulnerability in the WordPress plugin Tour Master - Tour Booking, Travel, Hotel, affecting all versions up to 5. 3. 6. The flaw exists due to improper sanitization of the 'review_id' parameter, allowing authenticated users with Subscriber-level access or higher to perform time-based SQL injection attacks. Exploitation enables attackers to append malicious SQL queries to extract sensitive database information without requiring user interaction. The vulnerability does not affect system availability or integrity but poses a significant confidentiality risk. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized data disclosure. Countries with high WordPress usage and tourism-related businesses are most at risk. The CVSS score is 6.
AI-Powered Analysis
Technical Analysis
CVE-2024-13369 is a time-based SQL Injection vulnerability identified in the WordPress plugin Tour Master - Tour Booking, Travel, Hotel, affecting all versions up to and including 5.3.6. The vulnerability arises from improper neutralization of special elements in the 'review_id' parameter, which is insufficiently escaped and inadequately prepared in SQL queries. This flaw allows authenticated attackers with at least Subscriber-level privileges to inject additional SQL commands into existing queries. The injection is time-based, enabling attackers to infer data by measuring response delays, thus extracting sensitive information from the backend database. The vulnerability does not require user interaction but does require authentication, limiting the attack surface to users with some level of access. The plugin is widely used in WordPress sites related to travel, hotel booking, and tour management, making the vulnerability relevant to organizations in the tourism sector. The CVSS 3.1 base score is 6.5, indicating a medium severity level, with a vector showing network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No public exploits have been reported yet, but the vulnerability poses a risk of sensitive data disclosure if exploited.
Potential Impact
The primary impact of CVE-2024-13369 is unauthorized disclosure of sensitive information stored in the backend database of affected WordPress sites using the Tour Master plugin. Attackers with Subscriber-level access can exploit the vulnerability to extract data such as user details, booking information, and potentially payment or personal data, depending on the database schema. Although the vulnerability does not affect data integrity or availability, the confidentiality breach can lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential financial losses. Organizations operating in the travel and hospitality sectors, which often handle sensitive customer data, are particularly at risk. The requirement for authentication limits exploitation to insiders or compromised accounts, but this does not eliminate the threat, especially in environments with weak access controls or credential reuse. The absence of known exploits in the wild suggests limited current exploitation, but the vulnerability's medium severity and ease of exploitation warrant prompt remediation to prevent future attacks.
Mitigation Recommendations
To mitigate CVE-2024-13369, organizations should immediately update the Tour Master plugin to a patched version once released by GoodLayers. Until a patch is available, implement the following specific measures: 1) Restrict Subscriber-level user permissions to the minimum necessary, removing unnecessary access to the vulnerable functionality; 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'review_id' parameter; 3) Conduct thorough code reviews and apply manual input validation and parameterized queries or prepared statements in the plugin code if possible; 4) Monitor logs for unusual database query patterns or delays indicative of time-based SQL injection attempts; 5) Enforce strong authentication and credential hygiene to reduce the risk of account compromise; 6) Isolate the WordPress environment and database with strict network segmentation to limit lateral movement in case of exploitation; 7) Regularly back up databases and test restoration procedures to mitigate potential data loss from future incidents. These targeted actions go beyond generic advice by focusing on the specific vulnerable parameter, user roles, and plugin context.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-13T19:38:26.086Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e51b7ef31ef0b59e309
Added to database: 2/25/2026, 9:49:05 PM
Last enriched: 2/26/2026, 1:45:41 AM
Last updated: 2/26/2026, 9:40:20 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.