Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9874: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ays-pro Poll Maker – Versus Polls, Anonymous Polls, Image Polls

0
Medium
VulnerabilityCVE-2024-9874cvecve-2024-9874cwe-89
Published: Sat Nov 09 2024 (11/09/2024, 06:41:29 UTC)
Source: CVE Database V5
Vendor/Project: ays-pro
Product: Poll Maker – Versus Polls, Anonymous Polls, Image Polls

Description

CVE-2024-9874 is a medium severity SQL Injection vulnerability affecting the Poll Maker – Versus Polls, Anonymous Polls, Image Polls WordPress plugin up to version 5. 4. 6. The flaw exists in the 'orderby' parameter, which is improperly sanitized, allowing authenticated users with Administrator-level privileges or higher to perform time-based SQL Injection attacks. Exploitation can lead to unauthorized extraction of sensitive database information but does not affect data integrity or availability. No user interaction beyond authentication is required, and no known exploits are currently in the wild. The vulnerability requires high privileges, limiting the attack surface to trusted users with admin access. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential data leakage.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:45:19 UTC

Technical Analysis

CVE-2024-9874 identifies a time-based SQL Injection vulnerability in the Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress, versions up to and including 5.4.6. The vulnerability arises from improper neutralization of special characters in the 'orderby' parameter, which is used in SQL queries without sufficient escaping or prepared statements. This allows an authenticated attacker with Administrator-level access or higher to inject malicious SQL code appended to legitimate queries. The attack vector is network-based with no user interaction required beyond authentication. Exploiting this flaw enables attackers to extract sensitive information from the backend database by leveraging time delays in query responses to infer data. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). Although the CVSS v3.1 base score is 4.9 (medium), the impact on confidentiality is high, while integrity and availability remain unaffected. No patches or official fixes have been linked yet, and no known exploits are reported in the wild. The vulnerability affects all versions of the plugin up to 5.4.6, which is widely used in WordPress environments for creating various types of polls.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of sensitive information stored in the WordPress database, which may include user data, configuration details, or other confidential content managed by the plugin or the WordPress site. Since exploitation requires Administrator-level access, the threat is mainly from insider threats or compromised admin accounts. However, if an attacker gains admin credentials through phishing, credential stuffing, or other means, they could leverage this vulnerability to escalate data exfiltration capabilities. The vulnerability does not allow modification or deletion of data, nor does it cause denial of service, limiting its impact to confidentiality breaches. Organizations relying on this plugin for poll management risk exposure of sensitive internal data, which could lead to privacy violations, regulatory non-compliance, and reputational damage. The medium CVSS score reflects the balance between the high confidentiality impact and the requirement for high privileges.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade the Poll Maker plugin to a version that addresses this issue once available. In the absence of an official patch, administrators should restrict plugin access strictly to trusted users and consider disabling or removing the plugin if not essential. Implementing Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns in the 'orderby' parameter can provide temporary protection. Additionally, enforcing strong authentication mechanisms such as multi-factor authentication (MFA) for all administrator accounts reduces the risk of credential compromise. Regularly auditing user privileges to ensure only necessary users have admin rights will limit the attack surface. Monitoring database query logs for unusual time delays or anomalies may help detect exploitation attempts. Finally, developers should refactor the plugin code to use parameterized queries or prepared statements to prevent SQL injection vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-10-11T16:23:35.056Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b62b7ef31ef0b554de0

Added to database: 2/25/2026, 9:36:34 PM

Last enriched: 2/25/2026, 11:45:19 PM

Last updated: 2/26/2026, 9:49:40 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats