Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-2876 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Critical SQL Injection (SQLi) in WordPress Plugin 'Email Subscribers'. πŸ’₯ **Consequences**: Attackers can append malicious SQL queries.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-89 (SQL Injection). πŸ” **Flaw**: Insufficient escaping of user-supplied parameters in the `run` function of the `IG_ES_Subscribers_Query` class.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Plugin: **Email Subscribers & Newsletters** by Icegram. πŸ“‰ **Versions**: All versions up to and including **5.7.14**. 🌐 **Scope**: Over 90,000 websites potentially at risk.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Attacker Actions**: Unauthenticated attackers can execute arbitrary SQL. πŸ“Š **Impact**: Extract sensitive info (user creds, emails), modify/delete data, or gain administrative control.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: LOW. πŸ”“ **Auth**: **Unauthenticated**. No login required. βš™οΈ **Config**: Low complexity (AC:L). Easy to exploit remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Exploitation**: YES. πŸ“‚ **PoCs**: Multiple public Proof-of-Concept scripts available on GitHub (e.g., c0d3zilla, Quantum-Hacker). 🌍 **Risk**: Wild exploitation is highly likely given the low barrier to entry.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for the plugin 'Email Subscribers'. πŸ“‹ **Version Check**: Verify if installed version is ≀ 5.7.14. πŸ› οΈ **Tools**: Use WordPress security scanners or check `wp-content/plugins/email-subscribers/` for …

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: YES. πŸ”§ **Patch**: Version **5.7.15** and above are patched. πŸ“ **Reference**: See WordPress Plugin Directory changeset 3060251 for fix details.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Disable the plugin immediately. πŸ”’ **Mitigation**: If active use is critical, implement strict WAF rules to block SQLi payloads in the `IG_ES_Subscribers_Query` endpoint.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: CRITICAL. πŸš€ **Priority**: **IMMEDIATE ACTION**. πŸ’‘ **Reason**: CVSS 9.8, unauthenticated, public PoCs, and high impact. Patch to v5.7.15+ now.