First published: Wed Feb 28 2024(Updated: )
The Conversios – Google Analytics 4 (GA4), Meta Pixel & more Via Google Tag Manager For WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the ee_syncProductCategory function using the parameters conditionData, valueData, productArray, exclude and include in all versions up to, and including, 6.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tatvic Conversios.io | <7.0.8 | |
Google Tag Manager for WooCommerce | <=6.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0786 is classified as a high severity vulnerability due to the potential for time-based SQL injection.
To resolve CVE-2024-0786, update the Conversios plugin for WordPress to the latest version beyond 7.0.8.
All versions of the Conversios – Google Analytics 4 (GA4), Meta Pixel & more Via Google Tag Manager For WooCommerce plugin are affected by CVE-2024-0786.
CVE-2024-0786 can be exploited through time-based SQL injection via the ee_syncProductCategory function using specific parameters.
The impact of CVE-2024-0786 includes unauthorized database access, allowing attackers to retrieve or manipulate sensitive data.