CVSS 3.1 Score 9.8 of 10 (high)


Published Feb 17, 2024
Updated: Feb 20, 2024


CVE-2024-0610 is a vulnerability in the Piraeus Bank WooCommerce Payment Gateway plugin for WordPress, affecting all versions up to and including This vulnerability allows unauthenticated attackers to perform time-based blind SQL injection by exploiting the 'MerchantReference' parameter, which lacks proper escaping and preparation in the SQL query. As a result, attackers can append additional SQL queries to extract sensitive information from the database. The base severity of this vulnerability is rated as CRITICAL, with a base score of 9.8 out of 10. It poses a high risk to organizations, with potential impacts on confidentiality, integrity, and availability of data. To remediate this vulnerability, users should update to the latest version of the Piraeus Bank WooCommerce Payment Gateway plugin for WordPress.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-0610 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options