CVE-2024-8911
WordPress vulnerability analysis and mitigation

Overview

The LatePoint plugin for WordPress contains a critical SQL Injection vulnerability (CVE-2024-8911) in versions up to and including 5.0.11. The vulnerability allows unauthenticated attackers to perform arbitrary user password changes due to insufficient escaping of user-supplied parameters and inadequate SQL query preparation. This vulnerability is particularly impactful when the 'Use WordPress users as customers' setting is enabled, though it's disabled by default (NVD).

Technical details

The vulnerability has been assigned a CVSS v3.1 score of 9.8 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue stems from improper input validation and SQL query preparation, allowing attackers to manipulate user passwords through SQL injection. The vulnerability is classified as CWE-89: Improper Neutralization of Special Elements used in an SQL Command (NVD).

Impact

When exploited, this vulnerability enables unauthenticated attackers to change user passwords and potentially gain administrative access to WordPress installations. If the 'Use WordPress users as customers' setting is enabled, attackers can modify WordPress user passwords. Even with this setting disabled, attackers can still modify passwords of plugin customers stored in a separate database table (NVD).

Mitigation and workarounds

The vulnerability has been patched in version 5.0.12 of the LatePoint plugin. Site administrators are strongly advised to update to this version or later immediately. The fix addresses the SQL injection vulnerability by properly escaping user input and implementing proper SQL query preparation (LatePoint Changelog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management