CVSS 3.1 Score 7.2 of 10 (high)


Published Mar 29, 2024


CVE-2024-0913 is a time-based SQL Injection vulnerability affecting the WP ERP plugin for WordPress in all versions up to and including 1.12.9. This vulnerability arises due to insufficient escaping on user-supplied parameters, specifically the "status" and "customer_id," as well as inadequate preparation on the existing SQL query. It allows authenticated attackers with accounting manager or admin privileges to inject additional SQL queries into existing ones, potentially leading to the extraction of sensitive information from the database. The risk score for this vulnerability is 25, with a base severity of HIGH and a base score of 7.2 according to CVSS version 3.1. The exploitability score is 1.2, and the impact includes high integrity and confidentiality impacts, as well as a high availability impact if successfully exploited over the network.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.


Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-0913 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions