First published: Sat Mar 08 2025(Updated: )
The Post SMTP plugin for WordPress is vulnerable to generic SQL Injection via the ‘columns’ parameter in all versions up to, and including, 3.1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Post SMTP | <=3.1.2 | |
Wpexperts Post SMTP | <3.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13844 is classified as a critical SQL Injection vulnerability affecting the Post SMTP plugin for WordPress.
To fix CVE-2024-13844, update the Post SMTP plugin to version 3.1.3 or later.
CVE-2024-13844 affects all versions of the Post SMTP plugin up to and including version 3.1.2.
CVE-2024-13844 could potentially allow an attacker to execute malicious SQL queries, leading to data manipulation or unauthorized access.
The vulnerability in CVE-2024-13844 is due to insufficient escaping of user-supplied parameters in SQL queries.