CVE-2024-32086

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to access sensitive user and post data in the Citadela Listing WordPress plugin. It affects all WordPress sites running Citadela Listing versions up to 5.18.1. The exposure occurs without requiring any authentication.

💻 Affected Systems

Products:
  • AitThemes Citadela Listing WordPress Plugin
Versions: All versions up to and including 5.18.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with the vulnerable plugin version enabled. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate all user data (including potentially sensitive information) and all post content from the directory, leading to data breach, privacy violations, and regulatory compliance issues.

🟠

Likely Case

Attackers harvest user information (usernames, emails, other profile data) and listing content for spam, phishing, or reconnaissance purposes.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to data exposure within the WordPress environment, but sensitive information remains at risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has publicly available technical details, making exploitation trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.18.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/citadela-directory/wordpress-citadela-listing-plugin-5-18-1-unauthenticated-sensitive-data-users-posts-exposure-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Citadela Listing and click 'Update Now'. 4. Verify the plugin version is 5.18.2 or higher.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Citadela Listing plugin until patched.

wp plugin deactivate citadela-directory

Restrict Access

all

Use web application firewall (WAF) rules to block unauthenticated access to vulnerable endpoints.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the WordPress instance.
  • Deploy a web application firewall (WAF) with rules specifically blocking exploitation attempts for this vulnerability.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins. If version is 5.18.1 or lower, the system is vulnerable.

Check Version:

wp plugin get citadela-directory --field=version

Verify Fix Applied:

Confirm the plugin version is 5.18.2 or higher in the WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of requests to Citadela Listing API endpoints from unauthenticated users
  • Requests to user data or post listing endpoints without authentication headers

Network Indicators:

  • HTTP requests to /wp-json/citadela-directory/v1/ endpoints without authentication
  • Patterns of data extraction from listing endpoints

SIEM Query:

source="wordpress" AND (uri_path="/wp-json/citadela-directory/v1/*" AND NOT user_authenticated=true)

🔗 References

📤 Share & Export