.. / CVE-2024-3552

Exploit for WordPress Plugin Web Directory Free < 1.7.0 - Unauthenticated SQL Injection (CVE-2024-3552)

Description:

The Web Directory Free plugin for WordPress does not sanitize and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users. This leads to a SQL injection vulnerability using different techniques like UNION, Time-Based, and Error-Based.

Affected Products:

Proof of Concept

PoC exploits

Nuclei Template

View the template here CVE-2024-3552.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2024/CVE-2024-3552.yaml
Copy

References:

https://vulners.com/wpvulndb/CVE-2024-3552
https://wpscan.com/vulnerability/34b03ee4-de81-4fec-9f3d-e1bd5b94d136/