Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13490: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in enituretechnology LTL Freight Quotes – XPO Edition

0
High
VulnerabilityCVE-2024-13490cvecve-2024-13490cwe-89
Published: Wed Feb 12 2025 (02/12/2025, 09:22:50 UTC)
Source: CVE Database V5
Vendor/Project: enituretechnology
Product: LTL Freight Quotes – XPO Edition

Description

CVE-2024-13490 is a high-severity SQL Injection vulnerability in the WordPress plugin 'LTL Freight Quotes – XPO Edition' by enituretechnology, affecting all versions up to 4. 3. 7. The flaw arises from improper sanitization of the 'edit_id' and 'dropship_edit_id' parameters, allowing unauthenticated attackers to inject malicious SQL code. Exploitation can lead to unauthorized extraction of sensitive database information without requiring user interaction or authentication. Although no known exploits are currently reported in the wild, the vulnerability's ease of exploitation and high impact on confidentiality make it a critical risk for affected sites. Organizations using this plugin should prioritize patching or applying mitigations to prevent data breaches. The threat primarily affects WordPress sites using this specific plugin, with higher risk in countries where WordPress and this plugin have significant market penetration and where freight logistics companies rely on this software. The CVSS score of 7. 5 reflects the high confidentiality impact and network-level exploitability without privileges or user interaction.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:12:35 UTC

Technical Analysis

CVE-2024-13490 is a SQL Injection vulnerability identified in the 'LTL Freight Quotes – XPO Edition' WordPress plugin developed by enituretechnology. This vulnerability exists due to improper neutralization of special elements in SQL commands (CWE-89). Specifically, the plugin fails to properly sanitize and escape the 'edit_id' and 'dropship_edit_id' parameters before incorporating them into SQL queries. As a result, an unauthenticated attacker can manipulate these parameters to inject arbitrary SQL code, appending additional queries to the existing ones. This can lead to unauthorized disclosure of sensitive information stored in the backend database, such as user data, freight quotes, or other confidential business information. The vulnerability affects all versions up to and including 4.3.7. The CVSS v3.1 score is 7.5 (High), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). No patches or fixes are currently linked, and no known exploits have been reported in the wild, but the vulnerability poses a significant risk due to its ease of exploitation and potential data leakage.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive information from the affected WordPress site's database. Attackers exploiting this flaw can extract confidential data such as customer details, freight quotes, pricing information, or other proprietary business data. This can lead to privacy violations, competitive disadvantage, and regulatory compliance issues (e.g., GDPR, CCPA). Since the vulnerability requires no authentication or user interaction, it can be exploited remotely and at scale, increasing the risk of widespread data breaches. Although the vulnerability does not affect data integrity or availability directly, the exposure of sensitive data alone can cause significant reputational damage and financial loss. Organizations relying on this plugin for freight quoting and logistics management may face operational disruptions if attackers leverage the vulnerability to gain further footholds or conduct follow-on attacks. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately check for updates or patches from enituretechnology addressing CVE-2024-13490 and apply them as soon as they become available. If no official patch exists, temporarily disabling or uninstalling the 'LTL Freight Quotes – XPO Edition' plugin is recommended to eliminate exposure. As a short-term workaround, web application firewalls (WAFs) can be configured to detect and block suspicious SQL injection patterns targeting the 'edit_id' and 'dropship_edit_id' parameters. Additionally, administrators should audit database access logs for unusual queries and monitor for signs of exploitation. Implementing least privilege principles on the database user accounts used by the plugin can limit the potential damage of an injection attack. Regular backups and incident response plans should be reviewed and updated to prepare for potential data breaches. Finally, organizations should consider security testing and code review of custom or third-party plugins before deployment to prevent similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-16T19:15:23.354Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e5bb7ef31ef0b59ed60

Added to database: 2/25/2026, 9:49:15 PM

Last enriched: 2/26/2026, 12:12:35 AM

Last updated: 2/26/2026, 8:39:34 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats