Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-12025 β€” AI Deep Analysis Summary

CVSS 7.5 Β· High

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SQL Injection in 'Collapsing Categories' plugin. πŸ’₯ **Consequences**: Attackers can extract sensitive database info via the REST API. πŸ“‰ **Impact**: High confidentiality loss (CVSS C:H).

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-89 (SQL Injection). πŸ” **Flaw**: Insufficient escaping of the 'taxonomy' parameter. πŸ› **Root**: Lack of SQL preparation in the query logic.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Vendor**: robfelty. πŸ“± **Product**: Collapsing Categories (WordPress Plugin). πŸ“… **Affected**: Versions **3.0.8 and earlier**. ⚠️ **Note**: WordPress core is mentioned but the flaw is in the plugin.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Action**: Execute arbitrary SQL queries. πŸ’Ύ **Data**: Extract sensitive information from the database. πŸ”“ **Privilege**: Unauthenticated access required. No login needed!

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: LOW. πŸšͺ **Auth**: Unauthenticated (No login required). 🌐 **Vector**: Network (AV:N). 🎯 **Complexity**: Low (AC:L). Easy to exploit remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’» **PoC Available**: YES. πŸ”— **Links**: GitHub (RandomRobbieBF) & ProjectDiscovery Nuclei templates. 🌍 **Wild Exploit**: Likely, given low barrier to entry.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for `/wp-json/collapsing-categories/v1/get` endpoint. πŸ“‘ **Tool**: Use Nuclei templates for CVE-2024-12025. πŸ§ͺ **Test**: Send crafted 'taxonomy' parameter to trigger SQL error.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Update plugin to version **> 3.0.8**. πŸ“ **Patch**: Developer released fix (Changeset 3201979). βœ… **Status**: Fixed in newer versions.

Q9What if no patch? (Workaround)

🚫 **Workaround**: Disable/Deactivate the plugin if not needed. πŸ›‘οΈ **WAF**: Block suspicious SQL payloads in 'taxonomy' param. πŸ”’ **Access Control**: Restrict REST API access if possible.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: HIGH. ⚑ **Urgency**: Immediate action needed. πŸ“’ **Reason**: Unauthenticated + High Impact + Public PoC. πŸƒ **Action**: Patch NOW!