Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13476: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in enituretechnology LTL Freight Quotes – GlobalTranz Edition

0
High
VulnerabilityCVE-2024-13476cvecve-2024-13476cwe-89
Published: Thu Feb 20 2025 (02/20/2025, 09:21:39 UTC)
Source: CVE Database V5
Vendor/Project: enituretechnology
Product: LTL Freight Quotes – GlobalTranz Edition

Description

CVE-2024-13476 is a high-severity SQL Injection vulnerability in the enituretechnology LTL Freight Quotes – GlobalTranz Edition WordPress plugin, affecting all versions up to 2. 3. 11. It arises from improper sanitization of user input in the 'engtz_wd_save_dropship' AJAX endpoint, allowing unauthenticated attackers to inject malicious SQL commands. Exploitation can lead to unauthorized extraction of sensitive database information without requiring authentication or user interaction. Although no known exploits are currently reported in the wild, the vulnerability's network accessibility and ease of exploitation make it a significant risk. Organizations using this plugin should prioritize patching or applying mitigations to prevent data breaches. The threat primarily affects organizations relying on this plugin, with higher risk in countries where WordPress and this plugin have notable market penetration and where logistics and freight services are critical. Immediate mitigation steps include disabling the vulnerable endpoint, implementing web application firewalls with SQL injection rules, and monitoring for suspicious database queries.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:41:32 UTC

Technical Analysis

CVE-2024-13476 identifies a critical SQL Injection vulnerability in the LTL Freight Quotes – GlobalTranz Edition plugin for WordPress, specifically in the 'engtz_wd_save_dropship' AJAX endpoint. This vulnerability exists due to insufficient escaping and lack of proper query preparation on user-supplied parameters, allowing attackers to append arbitrary SQL commands to existing queries. The flaw affects all plugin versions up to and including 2.3.11. Since the endpoint is accessible without authentication, attackers can exploit this remotely over the network without any user interaction. Successful exploitation enables attackers to extract sensitive information from the underlying database, compromising confidentiality. The CVSS v3.1 score is 7.5 (high), reflecting the vulnerability's network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits have been reported yet, the vulnerability's characteristics make it a prime target for attackers aiming to access confidential data. The plugin is used in WordPress environments that support freight quote functionalities, particularly in logistics and transportation sectors. The vulnerability underscores the importance of input validation and parameterized queries in preventing SQL Injection attacks.

Potential Impact

The primary impact of CVE-2024-13476 is unauthorized disclosure of sensitive data stored in the affected WordPress plugin's database. Attackers exploiting this vulnerability can extract confidential information such as customer details, freight quotes, shipping data, and potentially other sensitive business information. This can lead to data breaches, loss of customer trust, regulatory penalties, and competitive disadvantage. Since the vulnerability does not affect integrity or availability directly, the main concern is confidentiality compromise. However, attackers could leverage extracted data for further attacks, including phishing or lateral movement within the victim's network. Organizations using this plugin in their logistics or freight management workflows face increased risk of targeted attacks, especially if they handle sensitive or regulated data. The ease of exploitation and lack of required authentication increase the threat level globally, potentially affecting any organization using this plugin without timely mitigation.

Mitigation Recommendations

1. Immediate action should be to update the LTL Freight Quotes – GlobalTranz Edition plugin to a patched version once available from the vendor. Since no patch links are currently provided, monitor vendor announcements closely. 2. Temporarily disable or restrict access to the 'engtz_wd_save_dropship' AJAX endpoint via web server or application firewall rules to prevent exploitation. 3. Deploy a Web Application Firewall (WAF) with SQL Injection detection and prevention rules tailored to block malicious payloads targeting this endpoint. 4. Conduct a thorough audit of database logs and application logs to detect any suspicious queries or access patterns indicative of exploitation attempts. 5. Implement strict input validation and parameterized queries in custom code or plugin forks if immediate patching is not feasible. 6. Limit exposure by restricting access to the WordPress admin and AJAX endpoints to trusted IP addresses where possible. 7. Educate system administrators and security teams about this vulnerability to ensure rapid response and monitoring. 8. Regularly back up databases and test restoration procedures to mitigate potential data loss from future attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-16T18:47:41.189Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e59b7ef31ef0b59ec5b

Added to database: 2/25/2026, 9:49:13 PM

Last enriched: 2/26/2026, 12:41:32 AM

Last updated: 2/26/2026, 7:04:19 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats