CVE-2024-56041
WordPress vulnerability analysis and mitigation

Overview

The VibeBP WordPress plugin versions before 1.9.9.5.1 contain an SQL Injection vulnerability (CVE-2024-56041). This security flaw affects authenticated users with minimal privileges, such as those with Subscriber roles, allowing them to perform SQL injection attacks to potentially compromise or extract database information. The vulnerability was discovered and reported by Rafie Muhammad from Patchstack on March 31, 2024, and was publicly disclosed on December 17, 2024 (Patchstack, BleepingComputer).

Technical details

The vulnerability has been assigned a CVSS v3.1 score of 8.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L. The flaw is classified as CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). One of the vulnerable code paths exists in the remove_message_label function, where there is no proper escaping process on the $slug variable, allowing authenticated users to perform SQL injection attacks (Cyble).

Impact

If successfully exploited, this vulnerability could allow attackers to execute malicious SQL queries, potentially leading to unauthorized access to sensitive database information, data theft, and compromise of the database integrity. The high CVSS score indicates the significant potential impact of this vulnerability on affected systems (Patchstack).

Mitigation and workarounds

Website administrators are strongly advised to update the VibeBP plugin to version 1.9.9.5.1 or later, which includes security patches that address this vulnerability. The update implements proper input validation measures to secure the plugin's SQL queries, ensuring that all user inputs are properly escaped and safe from malicious SQL injection attacks (Cyble).

Community reactions

CERT-In issued an urgent vulnerability note (CIVN-2024-0360) concerning this and other critical VibeBP vulnerabilities. The security community has emphasized the importance of immediate patching due to the critical nature of the vulnerability and its potential for exploitation (Cyble).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14977HIGH8.1
  • dokan-lite
NoYesJan 20, 2026
CVE-2025-14348MEDIUM5.3
  • wemail
NoYesJan 20, 2026
CVE-2026-1045MEDIUM4.4
  • viet-contact
NoNoJan 20, 2026
CVE-2026-1042MEDIUM4.4
  • wp-hello-bar
NoNoJan 20, 2026
CVE-2025-12573N/AN/A
  • bookingor
NoNoJan 20, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management