
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-27956 is a critical SQL Injection vulnerability discovered in the WordPress Automatic plugin by ValvePress, affecting versions through 3.92.0. The vulnerability was publicly disclosed on March 13, 2024, and allows unauthenticated attackers to execute arbitrary SQL queries on affected WordPress sites (Patchstack Advisory, WPScan). The plugin, which has over 40,000 active installations, is primarily used for automating content imports on WordPress websites.
The vulnerability exists in the inc/csv.php file of the plugin, where insufficient escaping of user-supplied parameters and inadequate preparation of SQL queries allows attackers to execute arbitrary SQL commands. The flaw received a critical CVSS score of 9.8 (NIST) and 9.9 (Patchstack), indicating its severe nature (NVD, Patchstack Database).
The vulnerability enables attackers to gain unauthorized access to websites, create admin-level user accounts, upload malicious files, and potentially take complete control of affected sites. For small and medium businesses using WordPress as their primary online presence, such compromises could be catastrophic (WPScan Blog, Censys).
The vulnerability has been patched in version 3.92.1 of the WordPress Automatic plugin. Site owners are strongly advised to update immediately to this version. Additional recommended security measures include reviewing and auditing user accounts, implementing robust security monitoring tools, maintaining regular backups, and watching for indicators of compromise such as administrator usernames starting with 'xtw' or renamed plugin files (Patchstack Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."