CVE-2024-51715
Published: 07 January 2025
Summary
CVE-2024-51715 is a high-severity SQL Injection (CWE-89) vulnerability in Flowdee Clickwhale. Its CVSS base score is 8.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 37.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validation of information inputs using defined tools and procedures, directly preventing blind SQL injection by neutralizing special elements in SQL commands.
SI-2 ensures identification, reporting, and timely correction of system flaws, directly mitigating this specific SQL injection vulnerability in ClickWhale versions <=2.4.1.
RA-5 mandates vulnerability scanning and remediation, enabling detection and patching of SQL injection flaws like CVE-2024-51715 in the ClickWhale plugin.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct remote exploitation of public-facing WordPress plugin via SQLi (T1190) enabling database data extraction (T1213.006).
NVD Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ClickWhale ClickWhale clickwhale allows Blind SQL Injection.This issue affects ClickWhale: from n/a through <= 2.4.1.
Deeper analysisAI
CVE-2024-51715 is an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability that enables Blind SQL Injection in the ClickWhale WordPress plugin. This flaw affects ClickWhale versions from n/a through 2.4.1 and is associated with CWE-89.
The vulnerability carries a CVSS v3.1 base score of 8.5 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L), indicating it can be exploited remotely by low-privileged users with low attack complexity and no user interaction required. Successful exploitation allows attackers to achieve high confidentiality impact by extracting sensitive data from the database, with a changed scope, no integrity impact, and low availability impact.
The Patchstack advisory provides details on this SQL injection vulnerability in the WordPress ClickWhale plugin version 2.4.1: https://patchstack.com/database/Wordpress/Plugin/clickwhale/vulnerability/wordpress-clickwhale-plugin-2-4-1-sql-injection-vulnerability?_s_id=cve.
Details
- CWE(s)