Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4847: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in alttextai Alt Text AI – Automatically generate image alt text for SEO and accessibility

0
High
VulnerabilityCVE-2024-4847cvecve-2024-4847cwe-89
Published: Wed May 15 2024 (05/15/2024, 01:56:54 UTC)
Source: CVE Database V5
Vendor/Project: alttextai
Product: Alt Text AI – Automatically generate image alt text for SEO and accessibility

Description

CVE-2024-4847 is a high-severity SQL Injection vulnerability in the Alt Text AI WordPress plugin, affecting all versions up to 1. 4. 9. The flaw arises from improper sanitization of the 'last_post_id' parameter, allowing authenticated users with Subscriber-level access or higher to inject malicious SQL queries. This can lead to unauthorized extraction, modification, or deletion of sensitive database information without requiring user interaction. The vulnerability has a CVSS score of 8. 8, indicating critical impacts on confidentiality, integrity, and availability. No known public exploits exist yet, but the ease of exploitation and the widespread use of WordPress make this a significant threat. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential data breaches and service disruptions. Countries with large WordPress user bases and active content management deployments are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:56:18 UTC

Technical Analysis

CVE-2024-4847 is a SQL Injection vulnerability classified under CWE-89 affecting the Alt Text AI plugin for WordPress, which automatically generates image alt text for SEO and accessibility purposes. The vulnerability exists due to insufficient escaping and lack of proper preparation of the 'last_post_id' parameter in SQL queries. Authenticated attackers with as little as Subscriber-level privileges can exploit this flaw by injecting additional SQL commands into existing queries. This injection can be used to extract sensitive data from the WordPress database, modify or delete data, and potentially compromise the entire site’s integrity and availability. The vulnerability affects all versions up to and including 1.4.9. The CVSS 3.1 base score is 8.8, reflecting network attack vector, low attack complexity, privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are publicly reported, the vulnerability’s nature and ease of exploitation make it a critical risk. The plugin’s widespread use in WordPress sites for SEO and accessibility increases the potential attack surface. The vulnerability was publicly disclosed on May 15, 2024, and no official patches have been linked yet, emphasizing the need for immediate mitigation.

Potential Impact

The impact of CVE-2024-4847 is significant for organizations using the Alt Text AI plugin on WordPress sites. Successful exploitation can lead to unauthorized disclosure of sensitive data such as user credentials, personal information, or site configuration details. Attackers could also alter or delete database records, leading to data integrity issues and potential site defacement or denial of service. Since the vulnerability requires only Subscriber-level access, which is commonly granted to registered users or contributors, the attack surface is broad. This can facilitate lateral movement within compromised sites or escalation of privileges. The availability of the site could be disrupted if attackers execute destructive SQL commands. Given WordPress’s dominance in content management systems worldwide, many organizations, including e-commerce, media, and government websites, could be affected, risking reputational damage, regulatory penalties, and operational downtime.

Mitigation Recommendations

Organizations should immediately verify if they use the Alt Text AI plugin and identify the version in use. Since no official patch is currently linked, temporary mitigations include restricting Subscriber-level user permissions to trusted individuals only and monitoring database queries for suspicious activity. Implementing Web Application Firewalls (WAF) with SQL Injection detection rules can help block exploitation attempts. Site administrators should disable or remove the vulnerable plugin until a patched version is released. Additionally, applying the principle of least privilege on WordPress user roles can reduce risk. Regular backups of the WordPress database and files are essential to enable recovery in case of compromise. Monitoring logs for unusual database access patterns and conducting security audits on WordPress installations can further enhance defense. Once a patch is available, prompt application is critical.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-05-13T18:02:43.694Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b96b7ef31ef0b556f45

Added to database: 2/25/2026, 9:37:26 PM

Last enriched: 2/26/2026, 12:56:18 AM

Last updated: 2/26/2026, 11:17:46 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats