CVE-2024-3605 Overview
The WP Hotel Booking plugin for WordPress is vulnerable to SQL Injection via the room_type parameter of the /wphb/v1/rooms/search-rooms REST API endpoint in all versions up to, and including, 2.1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Critical Impact
This vulnerability allows remote attackers to execute arbitrary code and access sensitive information without authentication.
Affected Products
- Thimpress WP Hotel Booking Plugin for WordPress
Discovery Timeline
- 2024-06-20 - CVE CVE-2024-3605 published to NVD
- 2024-11-21 - Last updated in NVD database
Technical Details for CVE-2024-3605
Vulnerability Analysis
The vulnerability arises from improper handling and sanitization of user inputs in the API endpoint, allowing attackers to inject malicious SQL code into the database query.
Root Cause
The primary cause is the lack of proper input validation and escaping mechanisms for the room_type parameter in SQL queries.
Attack Vector
Attackers can exploit this vulnerability remotely over the network by sending crafted HTTP requests to the vulnerable API endpoint.
SELECT * FROM rooms WHERE room_type = 'standard' OR 1=1; --
Detection Methods for CVE-2024-3605
Indicators of Compromise
- Unexpected access patterns to the database
- Unusual spike in unauthorized data access logs
- Anomalous HTTP query logs
Detection Strategies
To effectively detect this vulnerability:
- Implement intrusion detection systems (IDS) to monitor SQL query patterns.
- Use web application firewalls (WAF) to observe and block suspicious requests.
Monitoring Recommendations
Regularly monitor logs for SQL errors and unusual access requests to the database that might indicate injection attempts.
How to Mitigate CVE-2024-3605
Immediate Actions Required
- Apply input validation to sanitize user inputs.
- Use prepared statements or parameterized queries.
- Implement a WAF to detect and block attack patterns.
Patch Information
No official patch is currently available. Review vendor advisories for updates at Wordfence Advisory.
Workarounds
Until a full patch is available, consider disabling the vulnerable API endpoint and monitoring for unusual activities.
# Example: Disabling the vulnerable endpoint in .htaccess
RewriteEngine On
RewriteCond %{REQUEST_URI} /wphb/v1/rooms/search-rooms [NC]
RewriteRule ^(.*)$ - [R=404,L]
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

