Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-6172 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Time-based SQL Blind Injection in `db` parameter. πŸ“‰ **Consequences**: Full database compromise, data theft, and system integrity loss. Critical impact on confidentiality, integrity, and availability.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-89 (SQL Injection). ⚠️ **Flaw**: Unsanitized input in the `db` parameter allows attackers to inject malicious SQL logic, exploiting time delays to extract data.

Q3Who is affected? (Versions/Components)

🎯 **Affected**: WordPress Plugin: **Email Subscribers by Icegram Express**. πŸ“¦ **Version**: v5.7.25 and **all prior versions**. 🏒 **Vendor**: Icegram.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: Extract sensitive data (users, emails, configs). πŸ”„ **Privileges**: High impact (CVSS H). Can manipulate database content, potentially leading to full site takeover or massive data leaks.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. 🚫 **Auth**: No authentication required (PR:N). 🌐 **Access**: Network accessible (AV:N). Simple, low-complexity exploitation (AC:L).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exp?**: No specific PoC code provided in data. 🌍 **Wild Exploitation**: Likely high due to low barrier to entry (No auth, simple vector). WordFence has tracked it as a threat.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for plugin version `Email Subscribers` < 5.7.25. πŸ› οΈ **Tools**: Use WPScan or manual parameter fuzzing on `db` inputs to detect time-based delays.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed?**: Yes. πŸ“’ **Patch**: Update to version **> 5.7.25**. πŸ”— **Source**: Official WordPress plugin repository and vendor updates. Changeset 3107964 addresses the issue.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: Disable the plugin immediately if update is impossible. 🚫 **Block**: Restrict access to plugin endpoints via WAF. 🧹 **Audit**: Review database logs for suspicious time-delay queries.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: Patch **IMMEDIATELY**. High CVSS score (H/H/H) + No Auth required = High risk of automated exploitation. Do not delay.