Open Nav
Sign Up

Vulnerability in RSS Aggregator by Feedzy Plugin (CVE-2024-1317)

Bar Refael

February 21, 2024

A critical vulnerability has been identified in the RSS Aggregator by Feedzy plugin for WordPress, affecting versions up to 4.4.2. The plugin, which has over 50,000 active installations, is widely used for feed to post conversions, import capabilities, and RSS feed displays.

Vulnerability Details:

  • CVE ID: CVE-2024-1317
  • CVSS Score: 8.8 (High)
  • Affected Versions: Up to and including 4.4.2
  • Impact: SQL Injection, Data Exfiltration

Description:

The vulnerability arises from inadequate escaping of user-supplied parameters and insufficient preparation in SQL queries. Specifically, the search_key parameter in the plugin’s fetch_custom_fields() function is vulnerable, allowing authenticated attackers with contributor-level permissions or higher to inject malicious SQL and extract sensitive data, including password hashes.

The flaw is attributed to the misuse of the wpdb->prepare() function and the direct appending of the $like value to the query, bypassing critical defense mechanisms against SQL injection.

Mitigation Strategies:

  • Immediate Update: Upgrade to Feedzy version 4.4.3, which contains the patch for this vulnerability.
  • Review User Permissions: Limit user permissions to the minimum necessary and regularly audit user roles.
  • Monitor for Suspicious Activity: Keep an eye on database access logs and website activity for signs of exploitation.

Recommendations:

WordPress website administrators using the RSS Aggregator by Feedzy plugin should update to version 4.4.3 immediately to address this critical vulnerability. Additionally, it is advisable to review and adjust user permissions and monitor website activity to prevent potential exploitation.

Stay safe and informed,

OP Innovate Research Team.

Resources highlights

Critical Zero-Day in Samsung Galaxy Devices: CVE-2025-21042

A newly disclosed zero-day vulnerability in Samsung Galaxy smartphones has been actively exploited in the wild to deploy a sophisticated Android spyware framework known as…

Read more >

CVE-2025-21042

Critical RCE in CentOS Web Panel (CVE-2025-48703)

CVE-2025-48703 is a critical unauthenticated remote-code-execution (OS command injection) vulnerability in Control Web Panel (CWP / CentOS Web Panel) that allows attackers to inject shell…

Read more >

CVE-2025-48703

Actively Exploited Critical Vulnerability in Post SMTP Plugin for WordPress: CVE-2025-11833

A critical vulnerability (CVE-2025-11833) in the widely used Post SMTP WordPress plugin is being actively exploited to hijack administrator accounts and gain full control of…

Read more >

CVE-2025-11833

Malicious npm Packages Target Developers with Multi-OS Info-Stealer Payloads

A new software supply-chain attack has been uncovered involving ten malicious npm packages designed to steal developer credentials across Windows, macOS, and Linux systems. These…

Read more >

malicious npm packages

Cybersecurity Budgeting for 2026: Getting More Value from Every Dollar

As organizations close the books on 2025, cybersecurity leaders face a familiar dilemma: rising threats, growing expectations and shrinking budgets . Economic uncertainty has tightened…

Read more >

budgeting plan 2026

CVE-2025-59287: WSUS Remote Code Execution

CVE-2025-59287 is a critical remote code execution (RCE) vulnerability in the Windows Server Update Services (WSUS) role. An attacker who can reach a WSUS server…

Read more >

CVE-2025-59287
Under Cyber Attack?

Fill out the form and we will contact you immediately.