PT-2024-3159 · WordPress +1 · Wordpress +1
Rafie Muhammad
·
Published
2024-02-25
·
Updated
2025-08-27
·
CVE-2024-27956
CVSS v3.1
9.9
9.9
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L |
Name of the Vulnerable Software and Affected Versions
ValvePress Automatic versions prior to 3.92.1
Description
The issue is related to an SQL Injection vulnerability that allows attackers to execute arbitrary SQL commands. This can lead to site takeovers and malicious activities. The vulnerability is being actively exploited, with over 5.5 million attack attempts reported. The
q
variable is passed directly into a $wpdb->get results()
call, allowing attackers to execute SQL commands directly. For example, an attacker can add a new WordPress user by executing an INSERT INTO query, or give a user admin rights by modifying the wp usermeta
table.Recommendations
To resolve the issue, update ValvePress Automatic to version 3.92.1 or later. As a temporary workaround, consider disabling the vulnerable
inc/csv.php
file or restricting access to it until a patch is available. Additionally, restrict access to the wp-automatic
plugin to minimize the risk of exploitation. Avoid using the q
variable in the affected API endpoint until the issue is resolved.Exploit
Fix
SQL injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2024-03372
CVE-2024-27956
Affected Products
Valvepress Automatic
Wordpress
References · 69
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_automatic_sqli_to_rce.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956⭐ 94 🔗 23 · Exploit
- 🔥 https://github.com/diego-tella/CVE-2024-27956-RCE⭐ 83 🔗 25 · Exploit
- 🔥 https://github.com/truonghuuphuc/CVE-2024-27956⭐ 18 · Exploit
- 🔥 https://github.com/ThatNotEasy/CVE-2024-27956⭐ 7 🔗 1 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2024-27956 · Security Note
- https://bdu.fstec.ru/vul/2024-03372 · Security Note
- https://wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/wp-automatic/automatic-3920-unauthenticated-sql-injection · Note
- https://twitter.com/antonio_taboada/status/1905589501998538859 · Twitter Post
- https://twitter.com/smarttech247/status/1785202425374130395 · Twitter Post
- https://twitter.com/the_yellow_fall/status/1770020309628002316 · Twitter Post
- https://t.me/aptreports/21621 · Telegram Post
- https://twitter.com/vipr_lab/status/1786283530974048381 · Twitter Post
- https://securitylab.ru/news/547778.php · Note
- https://twitter.com/Matrix_Weaver/status/1906707146177466728 · Twitter Post