Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4845: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in icegram Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce

0
High
VulnerabilityCVE-2024-4845cvecve-2024-4845cwe-89
Published: Wed Jun 12 2024 (06/12/2024, 09:33:11 UTC)
Source: CVE Database V5
Vendor/Project: icegram
Product: Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce

Description

CVE-2024-4845 is a high-severity SQL Injection vulnerability affecting the Icegram Express WordPress plugin, specifically in the 'options[list_id]' parameter. It allows authenticated users with Subscriber-level access or higher to inject malicious SQL code due to improper input sanitization and insufficient query preparation. Exploitation can lead to unauthorized extraction of sensitive database information and potentially full compromise of data confidentiality, integrity, and availability. The vulnerability affects all versions up to and including 5. 7. 22. No user interaction beyond authentication is required, and the attack can be performed remotely. Although no known exploits are currently in the wild, the ease of exploitation and impact make this a critical concern for websites using this plugin. Immediate patching or mitigation is recommended to prevent data breaches. Organizations relying on WordPress with this plugin should audit user privileges and monitor for suspicious database activity.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:56:06 UTC

Technical Analysis

CVE-2024-4845 is a SQL Injection vulnerability classified under CWE-89 found in the Icegram Express plugin for WordPress, which is widely used for email marketing, newsletters, and automation in WordPress and WooCommerce environments. The vulnerability arises from improper neutralization of special elements in the 'options[list_id]' parameter, which is insufficiently escaped and not properly prepared in the SQL query. This flaw allows authenticated attackers with Subscriber-level access or higher to append arbitrary SQL commands to existing queries. Because the plugin does not adequately sanitize or parameterize this input, attackers can manipulate the database query to extract sensitive information such as user data, email lists, or other confidential content stored in the database. The vulnerability affects all versions up to 5.7.22, making it broadly impactful for users who have not updated. The CVSS 3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required beyond authentication. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation pose a significant risk. The plugin’s role in managing email subscribers and marketing data means that exploitation could lead to data leakage, unauthorized data manipulation, or disruption of marketing operations.

Potential Impact

The impact of CVE-2024-4845 is substantial for organizations using the Icegram Express plugin on WordPress sites, especially those handling sensitive customer or subscriber data. Successful exploitation can lead to unauthorized disclosure of sensitive information, including subscriber lists, personal data, and potentially administrative credentials if stored in the database. This compromises confidentiality and can lead to privacy violations and regulatory non-compliance. Integrity of data is also at risk, as attackers could modify or delete records, disrupting marketing campaigns or corrupting data. Availability may be affected if attackers execute destructive queries or cause database errors. Given the plugin’s integration with WooCommerce, e-commerce operations could be disrupted, impacting business continuity and revenue. The requirement for only Subscriber-level access lowers the barrier for exploitation, increasing the threat surface. Organizations worldwide that rely on WordPress for marketing and e-commerce are at risk of data breaches, reputational damage, and financial losses.

Mitigation Recommendations

To mitigate CVE-2024-4845, organizations should immediately update the Icegram Express plugin to a version that addresses this vulnerability once released by the vendor. Until a patch is available, restrict Subscriber-level access and review user roles to minimize the number of users with such privileges. Implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'options[list_id]' parameter. Conduct thorough input validation and sanitization on all user-supplied data at the application level. Regularly audit database queries and logs for unusual activity that may indicate exploitation attempts. Employ the principle of least privilege for database accounts used by the plugin to limit the scope of potential damage. Additionally, monitor WordPress and plugin security advisories for updates and apply security patches promptly. Consider isolating critical marketing and e-commerce systems to reduce lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-05-13T17:23:36.368Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b96b7ef31ef0b556f41

Added to database: 2/25/2026, 9:37:26 PM

Last enriched: 2/26/2026, 12:56:06 AM

Last updated: 2/26/2026, 8:05:26 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats