Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50498: CWE-94 Improper Control of Generation of Code ('Code Injection') in LUBUS WP Query Console

0
Critical
VulnerabilityCVE-2024-50498cvecve-2024-50498cwe-94
Published: Mon Oct 28 2024 (10/28/2024, 11:24:26 UTC)
Source: CVE Database V5
Vendor/Project: LUBUS
Product: WP Query Console

Description

Improper Control of Generation of Code ('Code Injection') vulnerability in LUBUS WP Query Console allows Code Injection.This issue affects WP Query Console: from n/a through 1.0.

AI-Powered Analysis

AILast updated: 01/23/2026, 15:50:56 UTC

Technical Analysis

CVE-2024-50498 is a critical vulnerability identified in the LUBUS WP Query Console WordPress plugin, affecting versions up to 1.0. The root cause is improper control of code generation, categorized as CWE-94, which enables code injection attacks. This vulnerability allows an unauthenticated attacker to remotely execute arbitrary code on the server hosting the vulnerable plugin. The CVSS v3.1 score is 10.0, reflecting the highest severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), scope changed (S:C), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability arises because the plugin fails to properly sanitize or validate user input before dynamically generating and executing code, leading to arbitrary code execution. This can result in full system compromise, data theft, defacement, or further lateral movement within the network. No patches or fixes have been published yet, and no known exploits are currently reported in the wild. However, the critical nature of this vulnerability and its ease of exploitation make it a high-priority threat. Organizations using this plugin should consider immediate mitigation steps to prevent exploitation.

Potential Impact

For European organizations, the impact of CVE-2024-50498 can be severe. Since the vulnerability allows unauthenticated remote code execution, attackers can gain full control over affected WordPress sites, which are often used for corporate websites, e-commerce platforms, and internal portals. This can lead to data breaches involving sensitive customer or employee information, defacement of websites damaging brand reputation, and use of compromised servers as pivot points for further attacks within the corporate network. The availability of critical services could be disrupted by attackers deploying ransomware or destructive payloads. Given the widespread adoption of WordPress across Europe, especially in small and medium enterprises, the potential attack surface is large. The lack of a patch increases the risk window, and the critical CVSS score indicates that the vulnerability can be exploited with minimal effort and no authentication, amplifying the threat to European digital infrastructure.

Mitigation Recommendations

1. Immediately disable or uninstall the LUBUS WP Query Console plugin from all WordPress installations until a security patch is released. 2. Monitor official vendor channels and security advisories for patch availability and apply updates promptly once released. 3. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin’s endpoints, focusing on code injection patterns. 4. Conduct thorough audits of WordPress sites to identify any unauthorized changes or signs of compromise related to this vulnerability. 5. Restrict access to WordPress admin panels and plugin management interfaces using IP whitelisting or VPNs to reduce exposure. 6. Employ intrusion detection systems (IDS) and endpoint detection and response (EDR) tools to monitor for anomalous activities indicative of exploitation attempts. 7. Educate site administrators on the risks of installing unverified plugins and enforce strict plugin management policies. 8. Regularly back up WordPress sites and databases to enable rapid recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-10-24T07:26:59.133Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697395744623b1157c4bc726

Added to database: 1/23/2026, 3:36:20 PM

Last enriched: 1/23/2026, 3:50:56 PM

Last updated: 2/7/2026, 9:57:19 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats