First published: Wed Feb 19 2025(Updated: )
The Small Package Quotes – USPS Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' parameter in all versions up to, and including, 1.3.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Small Package Quotes – USPS Edition | <=1.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13533 is a high-severity vulnerability that allows SQL Injection due to insufficient escaping of the 'edit_id' parameter.
To fix CVE-2024-13533, update the Small Package Quotes – USPS Edition plugin to version 1.3.6 or later.
CVE-2024-13533 affects all versions of the Small Package Quotes – USPS Edition plugin up to and including version 1.3.5.
CVE-2024-13533 is classified as an SQL Injection vulnerability.
Yes, CVE-2024-13533 can allow unauthorized access to the database, potentially exposing sensitive information.