Wednesday, April 30, 2025
HomeCVE/vulnerabilityCritical WordPress Plugin Flaw Exposes 90,000+ WordPress Sites

Critical WordPress Plugin Flaw Exposes 90,000+ WordPress Sites

Published on

SIEM as a Service

Follow Us on Google News

A critical vulnerability has been discovered in the popular WordPress plugin “Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce.”

The flaw, identified as CVE-2024-6172, has been assigned a CVSS score of 9.8, indicating its severe impact.

The vulnerability was publicly disclosed on July 1, 2024, and last updated on July 2, 2024, by the researcher known as shaman0x01 from the Shaman Red Team.

- Advertisement - Google News

CVE-2024-6172 – Vulnerability Details

According to the Wordfence blog, the vulnerability affects all plugin versions up to and including 5.7.25.

It stems from insufficient escaping of the user-supplied db parameter and inadequate preparation on the existing SQL query.

This flaw allows unauthenticated attackers to execute time-based SQL Injection attacks, enabling them to append additional SQL queries into existing ones.

Consequently, attackers can extract sensitive information from the database, posing a significant risk to the security and privacy of the affected websites.

"Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!"- Free Demo

The “Email Subscribers by Icegram Express” plugin is widely used for email marketing, newsletters, and automation on WordPress and WooCommerce sites.

With over 90,000 active installations, the potential impact of this vulnerability is extensive.

Websites using this plugin are at risk of data breaches, which could expose sensitive user information, including email addresses, passwords, and other personal data.

Research and Discovery

The vulnerability was discovered by shaman0x01, a researcher from the Shaman Red Team, with a track record of identifying critical security flaws.

The researcher’s findings highlight the importance of proper input validation and query preparation in preventing SQL Injection attacks.

Notably, CVE-2024-37252 appears to duplicate this issue, underscoring the critical nature of the vulnerability.

Website administrators using the “Email Subscribers by Icegram Express” plugin are strongly advised to mitigate the risk immediately.

The following steps are recommended:

  1. Update the Plugin: Check for any available updates from the plugin developers and apply them as soon as possible.
  2. Disable the Plugin: If an update is unavailable, consider temporarily disabling the plugin to prevent potential exploitation.
  3. Monitor for Unusual Activity: Check your website for any signs of unusual activity, such as unexpected database queries or unauthorized access attempts.
  4. Backup Data: Regularly back up your website data to ensure you can restore it in case of a security breach.

The discovery of CVE-2024-6172 is a stark reminder of the importance of robust security practices in plugin development.

As WordPress remains a popular platform for websites worldwide, ensuring the security of its plugins is crucial to maintaining the integrity and privacy of online data.

Website administrators must stay vigilant and proactive in addressing vulnerabilities to protect their sites and users from potential threats.

Are you from SOC/DFIR Teams? - Sign up for a free ANY.RUN account! to Analyse Advanced Malware Files

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Trellix Launches Phishing Simulator to Help Organizations Detect and Prevent Attacks

Trellix, a leader in cybersecurity solutions, has unveiled its latest innovation, the Trellix Phishing...

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens

Darktrace's Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been...

Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations

Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising...

Researchers Reveal Threat Actor TTP Patterns and DNS Abuse in Investment Scams

Cybersecurity researchers have uncovered the intricate tactics, techniques, and procedures (TTPs) employed by threat...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Trellix Launches Phishing Simulator to Help Organizations Detect and Prevent Attacks

Trellix, a leader in cybersecurity solutions, has unveiled its latest innovation, the Trellix Phishing...

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens

Darktrace's Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been...

Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations

Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising...