VYPR
High severity7.5NVD Advisory· Published Jan 8, 2025· Updated Apr 15, 2026

CVE-2024-11939

CVE-2024-11939

Description

The Cost Calculator Builder PRO plugin for WordPress is vulnerable to blind time-based SQL Injection via the ‘data’ parameter in all versions up to, and including, 3.2.15 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated blind time-based SQL injection vulnerability exists in the Cost Calculator Builder PRO WordPress plugin up to version 3.2.15, allowing extraction of sensitive data via the 'data' parameter.

The Cost Calculator Builder PRO WordPress plugin versions up to and including 3.2.15 are vulnerable to blind time-based SQL injection. The flaw resides in insufficient escaping of the ‘data’ parameter combined with a lack of prepared statements in the existing SQL query, enabling an attacker to manipulate the query structure [1].

As a time-based blind SQL injection, exploitation does not require authentication. An attacker can send crafted payloads through the ‘data’ parameter and observe database response delays to infer information. The unauthenticated nature and common attack vectors (e.g., HTTP requests to plugin endpoints) lower the barrier to exploitation [1].

Successful exploitation allows an unauthenticated attacker to extract sensitive information from the underlying database, potentially including usernames, hashed passwords, and other confidential data stored by the WordPress installation. This could lead to further compromise of the site [1].

The issue has been addressed in version 3.2.16 of the plugin. Users are strongly advised to update to this patched release or later to mitigate the risk [1]. The vendor changelog notes the fix under version 3.2.16 [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.