Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7857: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in maxfoundry Media Library Folders

0
Critical
VulnerabilityCVE-2024-7857cvecve-2024-7857cwe-89
Published: Thu Aug 29 2024 (08/29/2024, 02:31:30 UTC)
Source: CVE Database V5
Vendor/Project: maxfoundry
Product: Media Library Folders

Description

CVE-2024-7857 is a critical SQL Injection vulnerability in the Media Library Folders WordPress plugin by maxfoundry, affecting all versions up to 8. 2. 2. It arises from improper neutralization of the 'sort_type' parameter in the 'mlf_change_sort_type' AJAX action, allowing authenticated users with subscriber-level access or higher to inject malicious SQL code. This second-order SQL Injection flaw enables attackers to append additional queries to existing SQL commands, potentially extracting sensitive database information and compromising confidentiality, integrity, and availability. The vulnerability requires no user interaction beyond authentication and has a CVSS score of 9. 8, indicating a critical severity. No public exploits are currently known, but the ease of exploitation and high impact make it a significant threat to WordPress sites using this plugin. Organizations worldwide using this plugin should prioritize patching or mitigating this vulnerability immediately to prevent data breaches and system compromise.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:50:18 UTC

Technical Analysis

CVE-2024-7857 is a critical SQL Injection vulnerability identified in the Media Library Folders plugin for WordPress, developed by maxfoundry. The flaw exists in all versions up to and including 8.2.2 and is caused by improper escaping and insufficient preparation of the 'sort_type' parameter in the 'mlf_change_sort_type' AJAX action. This parameter is user-supplied and not adequately sanitized before being incorporated into SQL queries, leading to a second-order SQL Injection vulnerability. Authenticated attackers with subscriber-level privileges or higher can exploit this by injecting malicious SQL code that appends to existing queries, enabling unauthorized data extraction from the backend database. The vulnerability does not require elevated privileges beyond subscriber access, nor does it require user interaction beyond authentication, making it relatively easy to exploit in compromised or low-privilege accounts. The CVSS 3.1 base score is 9.8, reflecting the vulnerability's critical impact on confidentiality, integrity, and availability. While no public exploits have been reported yet, the nature of the vulnerability and its presence in a widely used WordPress plugin pose a substantial risk. The lack of a patch at the time of reporting necessitates immediate mitigation efforts by administrators.

Potential Impact

The exploitation of CVE-2024-7857 can have severe consequences for organizations running WordPress sites with the vulnerable Media Library Folders plugin. Attackers can extract sensitive information such as user credentials, configuration data, or other confidential database contents, leading to data breaches and privacy violations. The integrity of the database can be compromised by unauthorized modification or deletion of data, potentially disrupting website functionality and damaging organizational reputation. Availability may also be affected if injected queries cause database errors or crashes. Since the vulnerability can be exploited by low-privilege authenticated users, it increases the attack surface, especially in environments with many subscriber-level accounts or where account compromise is possible. This can facilitate lateral movement or privilege escalation within the WordPress environment. The widespread use of WordPress globally means that many organizations, including small businesses, media outlets, and e-commerce sites, are at risk. The critical severity score underscores the urgency of addressing this vulnerability to prevent significant operational and reputational damage.

Mitigation Recommendations

To mitigate CVE-2024-7857, organizations should immediately update the Media Library Folders plugin to a patched version once available. Until a patch is released, administrators should consider disabling the plugin or restricting access to the 'mlf_change_sort_type' AJAX action to trusted users only. Implementing Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'sort_type' parameter can provide temporary protection. Review and tighten user role assignments to minimize the number of subscriber-level accounts and monitor for unusual account activity. Employ database query logging and anomaly detection to identify potential exploitation attempts. Additionally, ensure that WordPress core and all plugins are regularly updated to reduce exposure to known vulnerabilities. Conduct security audits focusing on input validation and parameter sanitization in custom or third-party plugins. Finally, maintain regular backups of the database and website files to enable rapid recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-08-15T17:30:44.761Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c20b7ef31ef0b56035f

Added to database: 2/25/2026, 9:39:44 PM

Last enriched: 2/26/2026, 3:50:18 AM

Last updated: 2/26/2026, 11:22:12 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats