CVE-2024-0685
WordPress vulnerability analysis and mitigation

Overview

The Ninja Forms Contact Form Plugin for WordPress is vulnerable to Second Order SQL Injection (CVE-2024-0685) in versions up to and including 3.7.1. The vulnerability was discovered on January 17, 2024, and affects over 800,000 active installations. The issue exists in the email address value handling during form submissions, where insufficient escaping of user-supplied parameters and inadequate SQL query preparation create a security risk (Stealthcopter Blog, NVD).

Technical details

The vulnerability occurs in the get_subs_by_email function when processing data export requests. The function directly inserts user-provided email addresses into a raw SQL statement without proper sanitization. According to RFC 5322, email addresses can contain special characters including single quotes, which can be exploited to escape string boundaries in SQL queries. Attackers can craft malicious email addresses using SQL comments (/**/) to separate keywords and inject arbitrary SQL commands. The vulnerability has received a CVSS v3.1 base score of 5.9 (Medium) from Wordfence, while NIST assigned it a score of 9.8 (Critical) (NVD, Stealthcopter Blog).

Impact

When exploited, this vulnerability allows unauthenticated attackers to inject SQL code through their email address that will execute when an administrator triggers a personal data export. This can result in unauthorized access to all user data stored in the forms, posing significant privacy and security risks, particularly concerning GDPR compliance (Stealthcopter Blog).

Mitigation and workarounds

The vulnerability has been patched in version 3.7.2 of the Ninja Forms plugin, released on January 29, 2024. Users are strongly advised to update to this version or later to protect against this vulnerability (Stealthcopter Blog).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23550CRITICAL10
  • modular-connector
NoYesJan 14, 2026
CVE-2025-12166HIGH7.5
  • simply-schedule-appointments
NoYesJan 14, 2026
CVE-2026-0813MEDIUM4.4
  • short-link
NoNoJan 14, 2026
CVE-2026-0812MEDIUM4.4
  • linkedin-sc
NoNoJan 14, 2026
CVE-2026-0741MEDIUM4.4
  • electric-studio-download-counter
NoNoJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management