The AnalyticsWP plugin for WordPress is vulnerable to SQL Injection via the 'custom_sql' parameter in all versions up to, and including, 2.0.0 due to insufficient authorization checks on the handle_get_stats() function. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
History

Fri, 21 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Analyticswp
Analyticswp analyticswp
CPEs cpe:2.3:a:analyticswp:analyticswp:*:*:*:*:*:wordpress:*:*
Vendors & Products Analyticswp
Analyticswp analyticswp

Fri, 14 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 14 Mar 2025 07:30:00 +0000

Type Values Removed Values Added
Description The AnalyticsWP plugin for WordPress is vulnerable to SQL Injection via the 'custom_sql' parameter in all versions up to, and including, 2.0.0 due to insufficient authorization checks on the handle_get_stats() function. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title AnalyticsWP <= 2.0.0 - Unauthenticated SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-03-14T13:30:26.440Z

Reserved: 2025-01-09T22:42:12.076Z

Link: CVE-2024-13321

cve-icon Vulnrichment

Updated: 2025-03-14T13:30:18.308Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-14T08:15:11.447

Modified: 2025-03-21T14:47:58.847

Link: CVE-2024-13321

cve-icon Redhat

No data.