CVE-2024-5756: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in icegram Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce
CVE-2024-5756 is a critical SQL Injection vulnerability in the WordPress plugin 'Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce' affecting all versions up to 5. 7. 23. The flaw arises from improper sanitization of the 'db' parameter, allowing unauthenticated attackers to perform time-based SQL Injection attacks. This enables attackers to append malicious SQL queries to extract sensitive data, modify database contents, or disrupt service availability. The vulnerability requires no authentication or user interaction and has a CVSS score of 9. 8, indicating a critical risk. Although no known exploits are currently in the wild, the widespread use of this plugin in WordPress environments makes it a high-value target. Organizations using this plugin should prioritize patching or mitigation to prevent data breaches and service disruption. Countries with large WordPress user bases and significant e-commerce or marketing operations are most at risk.
AI Analysis
Technical Summary
CVE-2024-5756 is a critical SQL Injection vulnerability classified under CWE-89, affecting the 'Email Subscribers by Icegram Express' WordPress plugin used for email marketing and automation. The vulnerability exists due to insufficient escaping and lack of prepared statements on the 'db' parameter, which is user-supplied. This flaw allows unauthenticated attackers to inject arbitrary SQL commands into the backend database queries, specifically through time-based SQL Injection techniques. Time-based SQL Injection exploits the database's response time to infer data, enabling attackers to extract sensitive information such as user data, credentials, or configuration details without direct error messages. The vulnerability affects all plugin versions up to and including 5.7.23. The CVSS v3.1 base score is 9.8, reflecting the vulnerability's ease of exploitation (no authentication or user interaction required), and its severe impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the plugin's widespread deployment in WordPress sites, especially those integrated with WooCommerce for e-commerce, increases the attack surface. Attackers exploiting this vulnerability could compromise entire websites, steal sensitive subscriber data, manipulate marketing campaigns, or cause denial of service by corrupting the database. The vulnerability was publicly disclosed on June 21, 2024, and no official patches have been linked yet, emphasizing the need for immediate defensive actions.
Potential Impact
The impact of CVE-2024-5756 is significant for organizations using the affected WordPress plugin. Successful exploitation can lead to full database compromise, exposing sensitive subscriber information, including personal data and email lists, which can result in privacy violations and regulatory penalties (e.g., GDPR, CCPA). Attackers can also alter or delete data, undermining the integrity of marketing campaigns and customer communications. Additionally, the availability of the service can be disrupted by malicious SQL commands causing database errors or crashes, leading to downtime and loss of business continuity. For e-commerce sites using WooCommerce alongside this plugin, the risk extends to transactional data and customer trust. The vulnerability's unauthenticated nature means attackers can exploit it remotely without credentials, increasing the likelihood of automated scanning and exploitation attempts. This can lead to widespread compromise of WordPress sites globally, especially those relying on this plugin for critical marketing functions.
Mitigation Recommendations
1. Immediate action should be to disable the 'Email Subscribers by Icegram Express' plugin until a security patch is released. 2. Monitor web server and database logs for unusual or suspicious SQL queries, especially those involving the 'db' parameter. 3. Employ Web Application Firewalls (WAFs) with updated rules to detect and block SQL Injection attempts targeting this plugin. 4. Restrict database user permissions to the minimum necessary to limit the impact of potential injection attacks. 5. Regularly back up databases and website files to enable recovery in case of compromise. 6. Once a patch is available from the vendor, apply it promptly and verify the fix in a staging environment before production deployment. 7. Educate site administrators about the risks of installing unverified plugins and the importance of timely updates. 8. Consider implementing parameterized queries and input validation in custom code to prevent similar injection flaws. 9. Conduct security audits and vulnerability scans on WordPress installations to identify and remediate other potential weaknesses.
Affected Countries
United States, India, Germany, United Kingdom, Canada, Australia, Brazil, France, Japan, Netherlands, Italy, Spain
CVE-2024-5756: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in icegram Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce
Description
CVE-2024-5756 is a critical SQL Injection vulnerability in the WordPress plugin 'Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce' affecting all versions up to 5. 7. 23. The flaw arises from improper sanitization of the 'db' parameter, allowing unauthenticated attackers to perform time-based SQL Injection attacks. This enables attackers to append malicious SQL queries to extract sensitive data, modify database contents, or disrupt service availability. The vulnerability requires no authentication or user interaction and has a CVSS score of 9. 8, indicating a critical risk. Although no known exploits are currently in the wild, the widespread use of this plugin in WordPress environments makes it a high-value target. Organizations using this plugin should prioritize patching or mitigation to prevent data breaches and service disruption. Countries with large WordPress user bases and significant e-commerce or marketing operations are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-5756 is a critical SQL Injection vulnerability classified under CWE-89, affecting the 'Email Subscribers by Icegram Express' WordPress plugin used for email marketing and automation. The vulnerability exists due to insufficient escaping and lack of prepared statements on the 'db' parameter, which is user-supplied. This flaw allows unauthenticated attackers to inject arbitrary SQL commands into the backend database queries, specifically through time-based SQL Injection techniques. Time-based SQL Injection exploits the database's response time to infer data, enabling attackers to extract sensitive information such as user data, credentials, or configuration details without direct error messages. The vulnerability affects all plugin versions up to and including 5.7.23. The CVSS v3.1 base score is 9.8, reflecting the vulnerability's ease of exploitation (no authentication or user interaction required), and its severe impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the plugin's widespread deployment in WordPress sites, especially those integrated with WooCommerce for e-commerce, increases the attack surface. Attackers exploiting this vulnerability could compromise entire websites, steal sensitive subscriber data, manipulate marketing campaigns, or cause denial of service by corrupting the database. The vulnerability was publicly disclosed on June 21, 2024, and no official patches have been linked yet, emphasizing the need for immediate defensive actions.
Potential Impact
The impact of CVE-2024-5756 is significant for organizations using the affected WordPress plugin. Successful exploitation can lead to full database compromise, exposing sensitive subscriber information, including personal data and email lists, which can result in privacy violations and regulatory penalties (e.g., GDPR, CCPA). Attackers can also alter or delete data, undermining the integrity of marketing campaigns and customer communications. Additionally, the availability of the service can be disrupted by malicious SQL commands causing database errors or crashes, leading to downtime and loss of business continuity. For e-commerce sites using WooCommerce alongside this plugin, the risk extends to transactional data and customer trust. The vulnerability's unauthenticated nature means attackers can exploit it remotely without credentials, increasing the likelihood of automated scanning and exploitation attempts. This can lead to widespread compromise of WordPress sites globally, especially those relying on this plugin for critical marketing functions.
Mitigation Recommendations
1. Immediate action should be to disable the 'Email Subscribers by Icegram Express' plugin until a security patch is released. 2. Monitor web server and database logs for unusual or suspicious SQL queries, especially those involving the 'db' parameter. 3. Employ Web Application Firewalls (WAFs) with updated rules to detect and block SQL Injection attempts targeting this plugin. 4. Restrict database user permissions to the minimum necessary to limit the impact of potential injection attacks. 5. Regularly back up databases and website files to enable recovery in case of compromise. 6. Once a patch is available from the vendor, apply it promptly and verify the fix in a staging environment before production deployment. 7. Educate site administrators about the risks of installing unverified plugins and the importance of timely updates. 8. Consider implementing parameterized queries and input validation in custom code to prevent similar injection flaws. 9. Conduct security audits and vulnerability scans on WordPress installations to identify and remediate other potential weaknesses.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-06-07T17:14:58.254Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bf1b7ef31ef0b55cd93
Added to database: 2/25/2026, 9:38:57 PM
Last enriched: 2/26/2026, 2:48:09 AM
Last updated: 2/26/2026, 11:20:49 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighTrend Micro Patches Critical Apex One Vulnerabilities
CriticalCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.