Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13435: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in iwcontribution Ebook Downloader

0
High
VulnerabilityCVE-2024-13435cvecve-2024-13435cwe-89
Published: Wed Feb 12 2025 (02/12/2025, 09:22:49 UTC)
Source: CVE Database V5
Vendor/Project: iwcontribution
Product: Ebook Downloader

Description

CVE-2024-13435 is a high-severity SQL Injection vulnerability affecting all versions of the iwcontribution Ebook Downloader WordPress plugin up to and including version 1. 0. The flaw arises from improper sanitization of the 'download' parameter, allowing unauthenticated attackers to inject arbitrary SQL commands. Exploitation can lead to unauthorized disclosure of sensitive database information without requiring user interaction or authentication. Although no known exploits are currently observed in the wild, the vulnerability poses a significant risk to websites using this plugin. The vulnerability impacts confidentiality but does not affect integrity or availability directly. Organizations using this plugin should prioritize patching or applying mitigations to prevent data leakage. Countries with large WordPress user bases and significant ebook-related businesses are at higher risk. Immediate action is recommended to prevent potential exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:56:49 UTC

Technical Analysis

CVE-2024-13435 is a SQL Injection vulnerability identified in the iwcontribution Ebook Downloader plugin for WordPress, affecting all versions up to 1.0. The vulnerability stems from improper neutralization of special elements in the 'download' parameter, which is used in SQL queries without adequate escaping or prepared statements. This allows unauthenticated attackers to append malicious SQL code to existing queries, potentially extracting sensitive information from the backend database. The vulnerability is classified under CWE-89, indicating improper input validation leading to injection attacks. The CVSS v3.1 base score is 7.5 (high), reflecting the ease of remote exploitation without authentication or user interaction, and the high impact on confidentiality. The attack vector is network-based, requiring no privileges or user interaction, making it highly accessible to attackers scanning for vulnerable WordPress plugins. While no public exploits have been reported yet, the lack of patches or official fixes increases the risk of future exploitation. The vulnerability does not directly impact data integrity or availability but can lead to significant data breaches if exploited. The plugin’s widespread use in WordPress environments, especially in sites distributing ebooks, makes this a critical issue for website administrators and security teams.

Potential Impact

The primary impact of CVE-2024-13435 is unauthorized disclosure of sensitive information stored in the WordPress database, including potentially user data, configuration details, or other confidential content managed by the affected site. Since the vulnerability allows unauthenticated remote attackers to execute arbitrary SQL queries, it can lead to data breaches without requiring any credentials or user interaction. This can undermine user trust, violate data protection regulations, and cause reputational damage. Although the vulnerability does not directly affect data integrity or availability, attackers could leverage the extracted information for further attacks such as privilege escalation or lateral movement. Organizations relying on the Ebook Downloader plugin are at risk of exposure of intellectual property or personal data, which can have legal and financial repercussions. The ease of exploitation and the network accessibility of the vulnerable parameter increase the likelihood of automated scanning and targeted attacks, especially as awareness of the vulnerability grows.

Mitigation Recommendations

Since no official patches are currently available, organizations should immediately implement the following mitigations: 1) Disable or remove the iwcontribution Ebook Downloader plugin until a secure version is released. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'download' parameter, focusing on suspicious SQL syntax patterns. 3) Restrict access to the affected plugin’s endpoints by IP whitelisting or authentication where feasible to reduce exposure. 4) Monitor web server and database logs for unusual query patterns or error messages indicative of injection attempts. 5) Conduct a thorough audit of database contents for unauthorized data access or exfiltration signs. 6) Educate site administrators about the risks and encourage prompt updates once a patch is released. 7) Consider implementing parameterized queries and input validation in custom code if modifying the plugin is an option. These steps will reduce the attack surface and help prevent exploitation until an official fix is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-15T20:14:11.142Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e57b7ef31ef0b59e8f4

Added to database: 2/25/2026, 9:49:11 PM

Last enriched: 2/26/2026, 12:56:49 AM

Last updated: 2/26/2026, 7:09:16 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats