CVE-2024-9874: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ays-pro Poll Maker – Versus Polls, Anonymous Polls, Image Polls
CVE-2024-9874 is a medium severity SQL Injection vulnerability affecting the Poll Maker – Versus Polls, Anonymous Polls, Image Polls WordPress plugin up to version 5. 4. 6. The flaw exists in the 'orderby' parameter, which is improperly sanitized, allowing authenticated users with Administrator-level privileges or higher to perform time-based SQL Injection attacks. Exploitation can lead to unauthorized extraction of sensitive database information but does not affect data integrity or availability. No user interaction beyond authentication is required, and no known exploits are currently in the wild. The vulnerability requires high privileges, limiting the attack surface to trusted users with admin access. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential data leakage.
AI Analysis
Technical Summary
CVE-2024-9874 identifies a time-based SQL Injection vulnerability in the Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress, versions up to and including 5.4.6. The vulnerability arises from improper neutralization of special characters in the 'orderby' parameter, which is used in SQL queries without sufficient escaping or prepared statements. This allows an authenticated attacker with Administrator-level access or higher to inject malicious SQL code appended to legitimate queries. The attack vector is network-based with no user interaction required beyond authentication. Exploiting this flaw enables attackers to extract sensitive information from the backend database by leveraging time delays in query responses to infer data. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). Although the CVSS v3.1 base score is 4.9 (medium), the impact on confidentiality is high, while integrity and availability remain unaffected. No patches or official fixes have been linked yet, and no known exploits are reported in the wild. The vulnerability affects all versions of the plugin up to 5.4.6, which is widely used in WordPress environments for creating various types of polls.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive information stored in the WordPress database, which may include user data, configuration details, or other confidential content managed by the plugin or the WordPress site. Since exploitation requires Administrator-level access, the threat is mainly from insider threats or compromised admin accounts. However, if an attacker gains admin credentials through phishing, credential stuffing, or other means, they could leverage this vulnerability to escalate data exfiltration capabilities. The vulnerability does not allow modification or deletion of data, nor does it cause denial of service, limiting its impact to confidentiality breaches. Organizations relying on this plugin for poll management risk exposure of sensitive internal data, which could lead to privacy violations, regulatory non-compliance, and reputational damage. The medium CVSS score reflects the balance between the high confidentiality impact and the requirement for high privileges.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade the Poll Maker plugin to a version that addresses this issue once available. In the absence of an official patch, administrators should restrict plugin access strictly to trusted users and consider disabling or removing the plugin if not essential. Implementing Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns in the 'orderby' parameter can provide temporary protection. Additionally, enforcing strong authentication mechanisms such as multi-factor authentication (MFA) for all administrator accounts reduces the risk of credential compromise. Regularly auditing user privileges to ensure only necessary users have admin rights will limit the attack surface. Monitoring database query logs for unusual time delays or anomalies may help detect exploitation attempts. Finally, developers should refactor the plugin code to use parameterized queries or prepared statements to prevent SQL injection vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-9874: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ays-pro Poll Maker – Versus Polls, Anonymous Polls, Image Polls
Description
CVE-2024-9874 is a medium severity SQL Injection vulnerability affecting the Poll Maker – Versus Polls, Anonymous Polls, Image Polls WordPress plugin up to version 5. 4. 6. The flaw exists in the 'orderby' parameter, which is improperly sanitized, allowing authenticated users with Administrator-level privileges or higher to perform time-based SQL Injection attacks. Exploitation can lead to unauthorized extraction of sensitive database information but does not affect data integrity or availability. No user interaction beyond authentication is required, and no known exploits are currently in the wild. The vulnerability requires high privileges, limiting the attack surface to trusted users with admin access. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential data leakage.
AI-Powered Analysis
Technical Analysis
CVE-2024-9874 identifies a time-based SQL Injection vulnerability in the Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress, versions up to and including 5.4.6. The vulnerability arises from improper neutralization of special characters in the 'orderby' parameter, which is used in SQL queries without sufficient escaping or prepared statements. This allows an authenticated attacker with Administrator-level access or higher to inject malicious SQL code appended to legitimate queries. The attack vector is network-based with no user interaction required beyond authentication. Exploiting this flaw enables attackers to extract sensitive information from the backend database by leveraging time delays in query responses to infer data. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). Although the CVSS v3.1 base score is 4.9 (medium), the impact on confidentiality is high, while integrity and availability remain unaffected. No patches or official fixes have been linked yet, and no known exploits are reported in the wild. The vulnerability affects all versions of the plugin up to 5.4.6, which is widely used in WordPress environments for creating various types of polls.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive information stored in the WordPress database, which may include user data, configuration details, or other confidential content managed by the plugin or the WordPress site. Since exploitation requires Administrator-level access, the threat is mainly from insider threats or compromised admin accounts. However, if an attacker gains admin credentials through phishing, credential stuffing, or other means, they could leverage this vulnerability to escalate data exfiltration capabilities. The vulnerability does not allow modification or deletion of data, nor does it cause denial of service, limiting its impact to confidentiality breaches. Organizations relying on this plugin for poll management risk exposure of sensitive internal data, which could lead to privacy violations, regulatory non-compliance, and reputational damage. The medium CVSS score reflects the balance between the high confidentiality impact and the requirement for high privileges.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade the Poll Maker plugin to a version that addresses this issue once available. In the absence of an official patch, administrators should restrict plugin access strictly to trusted users and consider disabling or removing the plugin if not essential. Implementing Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns in the 'orderby' parameter can provide temporary protection. Additionally, enforcing strong authentication mechanisms such as multi-factor authentication (MFA) for all administrator accounts reduces the risk of credential compromise. Regularly auditing user privileges to ensure only necessary users have admin rights will limit the attack surface. Monitoring database query logs for unusual time delays or anomalies may help detect exploitation attempts. Finally, developers should refactor the plugin code to use parameterized queries or prepared statements to prevent SQL injection vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-10-11T16:23:35.056Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b62b7ef31ef0b554de0
Added to database: 2/25/2026, 9:36:34 PM
Last enriched: 2/25/2026, 11:45:19 PM
Last updated: 2/26/2026, 9:49:40 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.