CVSS 3.1 Score 7.2 of 10 (high)


Published Mar 29, 2024


CVE-2024-0913 is a time-based SQL Injection vulnerability affecting the WP ERP plugin for WordPress in all versions up to and including 1.12.9. This vulnerability arises due to insufficient escaping on user-supplied parameters, specifically the "status" and "customer_id," as well as inadequate preparation on the existing SQL query. It allows authenticated attackers with accounting manager or admin privileges to inject additional SQL queries into existing ones, potentially leading to the extraction of sensitive information from the database. The risk score for this vulnerability is 25, with a base severity of HIGH and a base score of 7.2 according to CVSS version 3.1. The exploitability score is 1.2, and the impact includes high integrity and confidentiality impacts, as well as a high availability impact if successfully exploited over the network.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-0913 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options