Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6933: SQL Injection in LimeSurvey

0
Medium
VulnerabilityCVE-2024-6933cvecve-2024-6933
Published: Sun Jul 21 2024 (07/21/2024, 00:31:04 UTC)
Source: CVE Database V5
Product: LimeSurvey

Description

A flaw has been found in LimeSurvey 6.5.14-240624. Affected by this issue is the function actionUpdateSurveyLocaleSettingsGeneralSettings of the file /index.php?r=admin/database/index/updatesurveylocalesettings_generalsettings of the component Survey General Settings Handler. This manipulation of the argument Language causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. Upgrading to version 6.6.2+240827 can resolve this issue. Patch name: d656d2c7980b7642560977f4780e64533a68e13d. You should upgrade the affected component.

AI-Powered Analysis

AILast updated: 12/09/2025, 15:12:36 UTC

Technical Analysis

CVE-2024-6933 is a SQL injection vulnerability identified in LimeSurvey version 6.5.14-240624 within the function actionUpdateSurveyLocaleSettingsGeneralSettings, located in the Survey General Settings Handler component. The vulnerability stems from insufficient sanitization of the 'Language' parameter passed to the /index.php?r=admin/database/index/updatesurveylocalesettings_generalsettings endpoint. This flaw permits remote attackers to inject arbitrary SQL commands into the backend database without requiring authentication or user interaction, exploiting the application's failure to properly validate or escape input data. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity, with attack vector network-based, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is limited but non-negligible, as attackers could manipulate survey data or extract sensitive information. Although no confirmed exploits are observed in the wild, a public exploit has been published, increasing the likelihood of exploitation attempts. The issue is fixed in LimeSurvey version 6.6.2+240827, with the patch identified by commit d656d2c7980b7642560977f4780e64533a68e13d. Organizations running vulnerable LimeSurvey instances should upgrade promptly to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized data access, modification, or deletion within LimeSurvey databases, potentially exposing sensitive survey data or disrupting survey operations. Given LimeSurvey's use in academic, governmental, and commercial sectors across Europe for data collection and analysis, exploitation could lead to breaches of personal data protected under GDPR, resulting in regulatory penalties and reputational damage. The ability to perform SQL injection remotely without authentication increases the threat level, especially for publicly accessible LimeSurvey installations. Attackers could leverage this vulnerability to extract confidential information, alter survey results, or cause denial of service by corrupting database contents. The medium severity rating reflects a moderate but actionable risk, emphasizing the need for timely patching to prevent exploitation that could impact data integrity and availability critical to decision-making processes in European institutions.

Mitigation Recommendations

To mitigate CVE-2024-6933, European organizations should immediately upgrade LimeSurvey installations to version 6.6.2+240827 or later, which contains the official patch addressing the SQL injection flaw. In addition to patching, organizations should implement strict input validation and sanitization on all user-supplied parameters, especially those related to language or locale settings, to prevent injection attacks. Employing web application firewalls (WAFs) configured to detect and block SQL injection patterns can provide an additional security layer. Regularly audit and monitor database logs for unusual queries or access patterns indicative of exploitation attempts. Restrict access to the LimeSurvey administration interface to trusted networks or VPNs to reduce exposure. Conduct periodic security assessments and penetration tests focusing on web application vulnerabilities. Finally, ensure that backups of survey data are maintained securely and tested for integrity to enable recovery in case of data corruption or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2024-07-20T06:04:06.978Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69383acf29cea75c35b77041

Added to database: 12/9/2025, 3:05:51 PM

Last enriched: 12/9/2025, 3:12:36 PM

Last updated: 12/11/2025, 5:41:13 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats