
20/6/2024

1/8/2024
CVE-2024-4742: Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress <= 1.2.5 - Authenticated (Contributor+) SQL Injection
First published: Thu Jun 20 2024(Updated: )
The Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress plugin for WordPress is vulnerable to SQL Injection via the order_by shortcode attribute in all versions up to, and including, 1.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|
KaineLabs Youzify | <=1.2.5 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2024-4742?
CVE-2024-4742 is classified as a medium severity vulnerability due to its potential for SQL Injection.
How do I fix CVE-2024-4742?
To fix CVE-2024-4742, update the Youzify plugin to version 1.2.6 or later immediately.
Who is affected by CVE-2024-4742?
Users of the Youzify plugin for WordPress with versions up to and including 1.2.5 are affected by CVE-2024-4742.
What types of attacks can CVE-2024-4742 enable?
CVE-2024-4742 can enable attackers to execute arbitrary SQL queries against the database, leading to data theft or manipulation.
Is there a workaround for CVE-2024-4742?
As a temporary workaround for CVE-2024-4742, users can disable the order_by shortcode attribute until the plugin is updated.
- agent/title
- agent/references
- agent/type
- agent/description
- agent/first-publish-date
- agent/author
- agent/event
- agent/weakness
- collector/epss-latest
- source/FIRST
- agent/epss
- agent/severity
- agent/softwarecombine
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- agent/source
- agent/tags
- collector/nvd-api
- source/NVD
- agent/software-canonical-lookup
- agent/software-canonical-lookup-request
- vendor/kainelabs
- canonical/kainelabs youzify
- version/kainelabs youzify/1.2.5
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203