Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8757: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in afthemes WP Post Author – Boost Your Blog's Engagement with Author Box, Social Links, Co-Authors, Guest Authors, Post Rating System, and Custom User Registration Form Builder

0
High
VulnerabilityCVE-2024-8757cvecve-2024-8757cwe-89
Published: Sat Oct 12 2024 (10/12/2024, 09:39:18 UTC)
Source: CVE Database V5
Vendor/Project: afthemes
Product: WP Post Author – Boost Your Blog's Engagement with Author Box, Social Links, Co-Authors, Guest Authors, Post Rating System, and Custom User Registration Form Builder

Description

CVE-2024-8757 is a high-severity SQL Injection vulnerability in the WordPress plugin 'WP Post Author – Boost Your Blog's Engagement' affecting all versions up to 3. 8. 1. The flaw exists in the linked_user_id parameter, which is insufficiently sanitized, allowing authenticated administrators to inject malicious SQL commands. Exploitation requires administrator-level privileges but does not require user interaction. Successful exploitation can lead to full compromise of the database confidentiality, integrity, and availability. No public exploits are known yet, but the vulnerability poses a significant risk to sites using this plugin. Organizations should prioritize patching or mitigating this vulnerability to prevent data breaches and service disruption. The threat primarily affects WordPress sites using this plugin, which are widespread globally, with particular risk in countries with high WordPress adoption. Mitigations include restricting admin access, monitoring database queries, and applying patches once available.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:41:58 UTC

Technical Analysis

CVE-2024-8757 is a time-based SQL Injection vulnerability identified in the WordPress plugin 'WP Post Author – Boost Your Blog's Engagement with Author Box, Social Links, Co-Authors, Guest Authors, Post Rating System, and Custom User Registration Form Builder' developed by afthemes. The vulnerability affects all versions up to and including 3.8.1. It arises due to improper neutralization of special elements in SQL commands (CWE-89), specifically insufficient escaping and lack of prepared statements for the user-supplied 'linked_user_id' parameter. This flaw allows an authenticated attacker with administrator-level privileges or higher to append arbitrary SQL queries to existing database queries. The injection is time-based, enabling attackers to infer data by measuring response delays. Exploitation can lead to unauthorized extraction of sensitive data, modification or deletion of database contents, and potentially full compromise of the WordPress site's backend data. The vulnerability does not require user interaction beyond authentication, and the attack vector is network accessible (AV:N). The CVSS v3.1 base score is 7.2, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity but requiring high privileges. No public exploits have been reported yet, but the risk is significant given the plugin's functionality and privileges required. The vulnerability was published on October 12, 2024, and no official patches have been linked yet, necessitating immediate attention from site administrators.

Potential Impact

The impact of CVE-2024-8757 is substantial for organizations using the affected WordPress plugin. An attacker with administrator privileges can exploit this vulnerability to perform SQL Injection attacks, potentially leading to full disclosure of sensitive information stored in the database, including user credentials, personal data, and site configuration details. Integrity of the database can be compromised by unauthorized modification or deletion of records, which may disrupt website functionality or deface content. Availability may also be affected if injected queries cause database crashes or lockups. Since the vulnerability requires administrator-level access, the initial compromise vector might be through credential theft or privilege escalation, but once exploited, the attacker gains powerful capabilities to manipulate the backend data. This can lead to data breaches, loss of customer trust, regulatory penalties, and operational downtime. The threat is particularly critical for high-traffic blogs, e-commerce sites, or any WordPress installations relying on this plugin for user engagement and content management.

Mitigation Recommendations

To mitigate CVE-2024-8757, organizations should take the following specific actions: 1) Immediately restrict administrator access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of credential compromise. 2) Monitor database query logs for unusual or time-delayed responses indicative of time-based SQL Injection attempts. 3) Disable or uninstall the affected plugin if it is not essential to reduce the attack surface. 4) Apply any official patches or updates from the plugin vendor as soon as they become available. 5) Implement Web Application Firewall (WAF) rules tailored to detect and block SQL Injection patterns targeting the linked_user_id parameter. 6) Conduct regular security audits and penetration testing focusing on WordPress plugins and their input validation mechanisms. 7) Educate site administrators on the risks of privilege misuse and the importance of secure coding practices. 8) Consider isolating the WordPress database with least privilege principles to limit the damage scope in case of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-09-12T17:42:24.138Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b30b7ef31ef0b54f251

Added to database: 2/25/2026, 9:35:44 PM

Last enriched: 2/25/2026, 10:41:58 PM

Last updated: 2/26/2026, 9:33:22 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats