Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28395: n/a

0
Critical
VulnerabilityCVE-2024-28395cvecve-2024-28395
Published: Wed Mar 20 2024 (03/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

SQL injection vulnerability in Best-Kit bestkit_popup v.1.7.2 and before allows a remote attacker to escalate privileges via the bestkit_popup.php component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 18:57:07 UTC

Technical Analysis

CVE-2024-28395 is a high-severity SQL injection vulnerability identified in the Best-Kit bestkit_popup plugin, specifically versions 1.7.2 and earlier. The vulnerability resides in the bestkit_popup.php script, which fails to properly sanitize user-supplied input before incorporating it into SQL queries. This lack of input validation allows a remote attacker to inject malicious SQL code, enabling unauthorized database queries. Because the vulnerability requires no authentication (PR:N) and no user interaction (UI:N), it can be exploited remotely over the network with minimal effort. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, indicating high impact on confidentiality, integrity, and availability. Successful exploitation could allow attackers to escalate privileges, access sensitive data, modify or delete database contents, and potentially execute further system-level commands depending on the backend environment. Although no patches or known exploits are currently available, the vulnerability’s presence in a widely used popup plugin for web applications makes it a significant risk. The CWE-89 classification confirms this is a classic SQL injection issue, a well-understood and highly dangerous class of vulnerabilities.

Potential Impact

The impact of CVE-2024-28395 is severe for organizations utilizing the Best-Kit bestkit_popup plugin in their web applications. Attackers can remotely exploit this vulnerability to gain unauthorized access to backend databases, leading to data breaches involving sensitive customer or corporate information. Privilege escalation may allow attackers to gain administrative control over the affected systems, potentially enabling further lateral movement within the network. Data integrity can be compromised through unauthorized modification or deletion of records, disrupting business operations. Additionally, availability may be affected if attackers execute destructive SQL commands or cause database corruption. Given the ease of exploitation without authentication or user interaction, the vulnerability poses a high risk of automated attacks and mass exploitation attempts once public exploit code becomes available. Organizations may face regulatory penalties, reputational damage, and financial losses due to data exposure or service disruption.

Mitigation Recommendations

To mitigate CVE-2024-28395, organizations should immediately audit their use of the Best-Kit bestkit_popup plugin and identify affected versions (1.7.2 and earlier). Since no official patches are currently available, temporary mitigations include implementing Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting bestkit_popup.php endpoints. Input validation and sanitization should be enforced at the application level to reject malicious inputs. Restrict database user permissions to the minimum necessary to limit the impact of potential injection attacks. Monitor web server and database logs for suspicious activity indicative of SQL injection attempts. Consider isolating or disabling the vulnerable plugin until a vendor patch is released. Stay alert for updates from the vendor or security community regarding patches or proof-of-concept exploits. Conduct penetration testing focused on SQL injection vectors to verify the effectiveness of mitigations. Finally, ensure regular backups of databases are maintained to enable recovery in case of data corruption or loss.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d8fb7ef31ef0b58892b

Added to database: 2/25/2026, 9:45:51 PM

Last enriched: 2/26/2026, 6:57:07 PM

Last updated: 4/12/2026, 1:59:49 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses