WordPress Ultimate Member SQL Injection (CVE-2024-1071)
Title source: metasploitDescription
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'sorting' parameter in versions 2.1.3 to 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Exploits (9)
nomisec
SCANNER
22 stars
by gh-ost00 · infoleak
https://github.com/gh-ost00/CVE-2024-1071-SQL-Injection
nomisec
WORKING POC
2 stars
by Spid3heX · infoleak
https://github.com/Spid3heX/CVE-2024-1071-PoC-Script
nomisec
WORKING POC
2 stars
by dogucyber · poc
https://github.com/dogucyber/WordPress-Exploit-CVE-2024-1071
metasploit
WORKING POC
by Christiaan Swiers, Valentin Lobstein · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/wp_ultimate_member_sorting_sqli.rb
Nuclei Templates (1)
WordPress Ultimate Member 2.1.3 - 2.8.2 – SQL Injection
CRITICALVERIFIEDby DhiyaneshDK,iamnooob
FOFA:
body="/wp-content/plugins/ultimate-member"
References (6)
Scores
CVSS v3
9.8
EPSS
0.9291
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
COMMUNITY
Community Lab
+6 more repos
Details
VulnCheck KEV
2024-02-23
CWE
CWE-89
Status
published
Products (1)
ultimatemember/ultimate_member
2.1.3 - 2.8.3
Published
Mar 13, 2024
Tracked Since
Feb 18, 2026