Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13500: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wedevs WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts

0
Medium
VulnerabilityCVE-2024-13500cvecve-2024-13500cwe-89
Published: Sat Feb 15 2025 (02/15/2025, 11:26:48 UTC)
Source: CVE Database V5
Vendor/Project: wedevs
Product: WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts

Description

CVE-2024-13500 is a medium severity time-based SQL Injection vulnerability in the WP Project Manager plugin for WordPress, affecting all versions up to 2. 6. 17. It arises from improper sanitization of the 'orderby' parameter, allowing authenticated users with Subscriber-level access or higher to inject SQL commands. This vulnerability can be exploited to extract sensitive database information without requiring user interaction. Although no known exploits are currently in the wild, the ease of exploitation and potential data exposure pose a significant risk. The vulnerability impacts confidentiality but does not affect data integrity or availability. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent unauthorized data disclosure. Countries with large WordPress user bases and significant adoption of this plugin are at higher risk. Defenders should implement strict input validation, restrict user privileges, and monitor database queries for anomalies.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:30:44 UTC

Technical Analysis

CVE-2024-13500 is a time-based SQL Injection vulnerability categorized under CWE-89, found in the WP Project Manager plugin for WordPress, which provides task, team, and project management features including kanban boards and Gantt charts. The vulnerability exists in the handling of the 'orderby' parameter, which is insufficiently escaped and improperly prepared in SQL queries. This flaw allows authenticated users with Subscriber-level access or higher to append malicious SQL code to existing queries. Exploitation does not require user interaction and can lead to unauthorized extraction of sensitive information from the database. The vulnerability affects all plugin versions up to and including 2.6.17. The CVSS v3.1 score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, and requiring privileges but no user interaction. No patches or known exploits are currently documented. The vulnerability primarily impacts confidentiality, with no direct effect on integrity or availability. The flaw stems from inadequate input validation and lack of parameterized queries or prepared statements in the plugin's codebase.

Potential Impact

The primary impact of CVE-2024-13500 is unauthorized disclosure of sensitive data stored in the WordPress database, which may include user information, project details, and other confidential content managed by the WP Project Manager plugin. Since exploitation requires only Subscriber-level access, attackers can leverage compromised or low-privilege accounts to escalate data exposure risks. Although the vulnerability does not affect data integrity or availability, the breach of confidentiality can lead to privacy violations, compliance issues, and reputational damage. Organizations relying on this plugin for project management may face operational risks if sensitive project data is leaked. The medium severity indicates a moderate but significant threat, especially in environments with many users or sensitive data. The absence of known exploits suggests a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

To mitigate CVE-2024-13500, organizations should immediately update the WP Project Manager plugin to a version where this vulnerability is fixed once available. Until a patch is released, implement strict input validation and sanitization on the 'orderby' parameter at the web application firewall (WAF) or reverse proxy level to block malicious SQL payloads. Restrict user privileges by minimizing the number of users with Subscriber-level or higher access, and audit existing accounts for suspicious activity. Employ database activity monitoring to detect unusual query patterns indicative of SQL injection attempts. Consider disabling or limiting the use of the vulnerable plugin if feasible. Developers should refactor the plugin code to use parameterized queries or prepared statements to prevent SQL injection. Regularly review and update security controls around WordPress installations, including timely plugin updates and security hardening.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-16T23:46:00.658Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e5bb7ef31ef0b59ed8a

Added to database: 2/25/2026, 9:49:15 PM

Last enriched: 2/26/2026, 12:30:44 AM

Last updated: 2/26/2026, 6:17:34 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats