Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13475: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in enituretechnology Small Package Quotes – UPS Edition

0
High
VulnerabilityCVE-2024-13475cvecve-2024-13475cwe-89
Published: Wed Feb 12 2025 (02/12/2025, 09:22:51 UTC)
Source: CVE Database V5
Vendor/Project: enituretechnology
Product: Small Package Quotes – UPS Edition

Description

CVE-2024-13475 is a high-severity SQL Injection vulnerability in the WordPress plugin Small Package Quotes – UPS Edition by enituretechnology, affecting all versions up to 4. 5. 16. The flaw arises from improper sanitization of the 'edit_id' parameter, allowing unauthenticated attackers to inject malicious SQL commands. This vulnerability enables attackers to extract sensitive database information without requiring authentication or user interaction. Although no known exploits are reported in the wild yet, the ease of exploitation and high impact on confidentiality make this a critical concern for affected WordPress sites. Organizations using this plugin should prioritize patching or applying mitigations immediately to prevent data breaches. The vulnerability primarily threatens websites globally that rely on this plugin, with higher risk in countries with widespread WordPress usage and e-commerce reliance. Defenders must implement strict input validation, consider web application firewalls, and monitor for suspicious database queries to mitigate risk effectively.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:41:44 UTC

Technical Analysis

CVE-2024-13475 is a SQL Injection vulnerability identified in the Small Package Quotes – UPS Edition WordPress plugin developed by enituretechnology. The vulnerability exists in all versions up to and including 4.5.16 and is caused by improper neutralization of special elements in the 'edit_id' parameter. Specifically, the plugin fails to adequately escape or prepare the SQL query that incorporates this parameter, allowing an unauthenticated attacker to append arbitrary SQL commands. This can lead to unauthorized data extraction from the underlying database, compromising confidentiality. The vulnerability does not require any authentication or user interaction, increasing its exploitability. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits have been reported, the vulnerability poses a significant risk to websites using this plugin, especially those handling sensitive customer or business data. The lack of a patch link indicates that a fix may not yet be available, necessitating immediate mitigation steps by administrators.

Potential Impact

The primary impact of CVE-2024-13475 is the unauthorized disclosure of sensitive information stored in the database of affected WordPress sites. Attackers exploiting this vulnerability can extract data such as customer details, shipping information, or other confidential business data managed by the Small Package Quotes – UPS Edition plugin. This breach of confidentiality can lead to data leaks, privacy violations, and potential regulatory non-compliance. Since the vulnerability does not affect integrity or availability directly, attackers cannot modify or delete data or disrupt services through this flaw alone. However, the extracted information could be used for further attacks, including phishing, identity theft, or gaining deeper access into the network. Organizations worldwide that rely on this plugin for shipping quotes or logistics integration face increased risk of data compromise, which could damage reputation and customer trust. The ease of exploitation and unauthenticated access make this a critical threat that could be leveraged by cybercriminals or state-sponsored actors targeting e-commerce and logistics platforms.

Mitigation Recommendations

To mitigate CVE-2024-13475, organizations should first check for and apply any official patches or updates released by enituretechnology as soon as they become available. In the absence of a patch, immediate steps include disabling or uninstalling the Small Package Quotes – UPS Edition plugin to eliminate the attack surface. Implementing a Web Application Firewall (WAF) with rules to detect and block SQL injection attempts targeting the 'edit_id' parameter can provide temporary protection. Administrators should also enforce strict input validation and sanitization at the application level, ensuring that all user-supplied parameters are properly escaped or parameterized in SQL queries. Monitoring database logs and web server logs for unusual query patterns or repeated failed attempts can help detect exploitation attempts early. Additionally, restricting database user permissions to the minimum necessary can limit the impact of a successful injection. Regular security audits and vulnerability scanning of WordPress plugins should be institutionalized to identify similar risks proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-16T18:45:02.089Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e59b7ef31ef0b59ec55

Added to database: 2/25/2026, 9:49:13 PM

Last enriched: 2/26/2026, 12:41:44 AM

Last updated: 2/26/2026, 7:35:48 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats