CVE-2024-4847: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in alttextai Alt Text AI – Automatically generate image alt text for SEO and accessibility
CVE-2024-4847 is a high-severity SQL Injection vulnerability in the Alt Text AI WordPress plugin, affecting all versions up to 1. 4. 9. The flaw arises from improper sanitization of the 'last_post_id' parameter, allowing authenticated users with Subscriber-level access or higher to inject malicious SQL queries. This can lead to unauthorized extraction, modification, or deletion of sensitive database information without requiring user interaction. The vulnerability has a CVSS score of 8. 8, indicating critical impacts on confidentiality, integrity, and availability. No known public exploits exist yet, but the ease of exploitation and the widespread use of WordPress make this a significant threat. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential data breaches and service disruptions. Countries with large WordPress user bases and active content management deployments are at higher risk.
AI Analysis
Technical Summary
CVE-2024-4847 is a SQL Injection vulnerability classified under CWE-89 affecting the Alt Text AI plugin for WordPress, which automatically generates image alt text for SEO and accessibility purposes. The vulnerability exists due to insufficient escaping and lack of proper preparation of the 'last_post_id' parameter in SQL queries. Authenticated attackers with as little as Subscriber-level privileges can exploit this flaw by injecting additional SQL commands into existing queries. This injection can be used to extract sensitive data from the WordPress database, modify or delete data, and potentially compromise the entire site’s integrity and availability. The vulnerability affects all versions up to and including 1.4.9. The CVSS 3.1 base score is 8.8, reflecting network attack vector, low attack complexity, privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are publicly reported, the vulnerability’s nature and ease of exploitation make it a critical risk. The plugin’s widespread use in WordPress sites for SEO and accessibility increases the potential attack surface. The vulnerability was publicly disclosed on May 15, 2024, and no official patches have been linked yet, emphasizing the need for immediate mitigation.
Potential Impact
The impact of CVE-2024-4847 is significant for organizations using the Alt Text AI plugin on WordPress sites. Successful exploitation can lead to unauthorized disclosure of sensitive data such as user credentials, personal information, or site configuration details. Attackers could also alter or delete database records, leading to data integrity issues and potential site defacement or denial of service. Since the vulnerability requires only Subscriber-level access, which is commonly granted to registered users or contributors, the attack surface is broad. This can facilitate lateral movement within compromised sites or escalation of privileges. The availability of the site could be disrupted if attackers execute destructive SQL commands. Given WordPress’s dominance in content management systems worldwide, many organizations, including e-commerce, media, and government websites, could be affected, risking reputational damage, regulatory penalties, and operational downtime.
Mitigation Recommendations
Organizations should immediately verify if they use the Alt Text AI plugin and identify the version in use. Since no official patch is currently linked, temporary mitigations include restricting Subscriber-level user permissions to trusted individuals only and monitoring database queries for suspicious activity. Implementing Web Application Firewalls (WAF) with SQL Injection detection rules can help block exploitation attempts. Site administrators should disable or remove the vulnerable plugin until a patched version is released. Additionally, applying the principle of least privilege on WordPress user roles can reduce risk. Regular backups of the WordPress database and files are essential to enable recovery in case of compromise. Monitoring logs for unusual database access patterns and conducting security audits on WordPress installations can further enhance defense. Once a patch is available, prompt application is critical.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-4847: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in alttextai Alt Text AI – Automatically generate image alt text for SEO and accessibility
Description
CVE-2024-4847 is a high-severity SQL Injection vulnerability in the Alt Text AI WordPress plugin, affecting all versions up to 1. 4. 9. The flaw arises from improper sanitization of the 'last_post_id' parameter, allowing authenticated users with Subscriber-level access or higher to inject malicious SQL queries. This can lead to unauthorized extraction, modification, or deletion of sensitive database information without requiring user interaction. The vulnerability has a CVSS score of 8. 8, indicating critical impacts on confidentiality, integrity, and availability. No known public exploits exist yet, but the ease of exploitation and the widespread use of WordPress make this a significant threat. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential data breaches and service disruptions. Countries with large WordPress user bases and active content management deployments are at higher risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-4847 is a SQL Injection vulnerability classified under CWE-89 affecting the Alt Text AI plugin for WordPress, which automatically generates image alt text for SEO and accessibility purposes. The vulnerability exists due to insufficient escaping and lack of proper preparation of the 'last_post_id' parameter in SQL queries. Authenticated attackers with as little as Subscriber-level privileges can exploit this flaw by injecting additional SQL commands into existing queries. This injection can be used to extract sensitive data from the WordPress database, modify or delete data, and potentially compromise the entire site’s integrity and availability. The vulnerability affects all versions up to and including 1.4.9. The CVSS 3.1 base score is 8.8, reflecting network attack vector, low attack complexity, privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are publicly reported, the vulnerability’s nature and ease of exploitation make it a critical risk. The plugin’s widespread use in WordPress sites for SEO and accessibility increases the potential attack surface. The vulnerability was publicly disclosed on May 15, 2024, and no official patches have been linked yet, emphasizing the need for immediate mitigation.
Potential Impact
The impact of CVE-2024-4847 is significant for organizations using the Alt Text AI plugin on WordPress sites. Successful exploitation can lead to unauthorized disclosure of sensitive data such as user credentials, personal information, or site configuration details. Attackers could also alter or delete database records, leading to data integrity issues and potential site defacement or denial of service. Since the vulnerability requires only Subscriber-level access, which is commonly granted to registered users or contributors, the attack surface is broad. This can facilitate lateral movement within compromised sites or escalation of privileges. The availability of the site could be disrupted if attackers execute destructive SQL commands. Given WordPress’s dominance in content management systems worldwide, many organizations, including e-commerce, media, and government websites, could be affected, risking reputational damage, regulatory penalties, and operational downtime.
Mitigation Recommendations
Organizations should immediately verify if they use the Alt Text AI plugin and identify the version in use. Since no official patch is currently linked, temporary mitigations include restricting Subscriber-level user permissions to trusted individuals only and monitoring database queries for suspicious activity. Implementing Web Application Firewalls (WAF) with SQL Injection detection rules can help block exploitation attempts. Site administrators should disable or remove the vulnerable plugin until a patched version is released. Additionally, applying the principle of least privilege on WordPress user roles can reduce risk. Regular backups of the WordPress database and files are essential to enable recovery in case of compromise. Monitoring logs for unusual database access patterns and conducting security audits on WordPress installations can further enhance defense. Once a patch is available, prompt application is critical.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-05-13T18:02:43.694Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b96b7ef31ef0b556f45
Added to database: 2/25/2026, 9:37:26 PM
Last enriched: 2/26/2026, 12:56:18 AM
Last updated: 2/26/2026, 11:17:46 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.