Lucene search

K
cve[email protected]CVE-2024-3552
HistoryJun 13, 2024 - 6:15 a.m.

CVE-2024-3552

2024-06-1306:15:11
web.nvd.nist.gov
36
web directory plugin
sql injection
cve-2024-3552
ajax action
unauthenticated users
sql statement
union
time-based
error-based

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.9%

The Web Directory Free WordPress plugin before 1.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based.

Affected configurations

Vulners
Node
salephpscriptsweb_directory_freeRange<1.7.0

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "Web Directory Free",
    "versions": [
      {
        "status": "affected",
        "versionType": "semver",
        "version": "0",
        "lessThan": "1.7.0"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.9%