CVE-2024-38755

8.5 HIGH

📋 TL;DR

This SQL injection vulnerability in the DirectoryPress WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It affects all DirectoryPress installations running versions up to 3.6.10, potentially compromising website data and functionality.

💻 Affected Systems

Products:
  • DirectoryPress WordPress Plugin
Versions: n/a through 3.6.10
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations using vulnerable DirectoryPress plugin versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, privilege escalation, or full website takeover.

🟠

Likely Case

Unauthorized data access, extraction of sensitive information (user credentials, personal data), and potential website defacement.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database user privilege restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly exploited with automated tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.6.11 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/directorypress/wordpress-directorypress-plugin-3-6-10-sql-injection-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find DirectoryPress and click 'Update Now'. 4. Verify update to version 3.6.11 or higher.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the DirectoryPress plugin until patched to prevent exploitation.

wp plugin deactivate directorypress

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns targeting DirectoryPress endpoints.

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all DirectoryPress-related inputs
  • Restrict database user permissions to minimum required privileges

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > DirectoryPress version. If version is 3.6.10 or lower, you are vulnerable.

Check Version:

wp plugin list --name=directorypress --field=version

Verify Fix Applied:

Verify DirectoryPress plugin version is 3.6.11 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in web server logs
  • Multiple failed SQL query attempts
  • Suspicious parameter values in DirectoryPress requests

Network Indicators:

  • SQL injection payloads in HTTP requests to DirectoryPress endpoints
  • Unusual database query patterns

SIEM Query:

source="web_server_logs" AND (uri="*directorypress*" AND (message="*sql*" OR message="*syntax*" OR param="*' OR *"))

🔗 References

📤 Share & Export