The Web Directory Free WordPress plugin before 1.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 25 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-03-25T14:04:25.515Z
Reserved: 2024-04-09T20:44:10.586Z
Link: CVE-2024-3552
Updated: 2024-08-01T20:12:07.922Z
Status : Modified
Published: 2024-06-13T06:15:11.633
Modified: 2025-03-25T14:15:25.203
Link: CVE-2024-3552
No data.
OpenCVE Enrichment
No data.
Weaknesses