First published: Sat Feb 15 2025(Updated: )
The WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 2.6.17 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP Project Manager | <=2.6.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13500 has a high severity level due to its potential for exposing sensitive data through time-based SQL Injection.
To remediate CVE-2024-13500, update the WP Project Manager plugin to version 2.6.18 or later.
CVE-2024-13500 affects all versions of the WP Project Manager plugin up to and including version 2.6.17.
Yes, CVE-2024-13500 can be exploited remotely due to its vulnerability in the ‘orderby’ parameter.
Exploiting CVE-2024-13500 may lead to unauthorized access to the database and manipulation of stored data.