CVE-2024-4443

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform time-based SQL injection attacks on WordPress sites using the Business Directory Plugin. Attackers can extract sensitive information from the database by manipulating the 'listingfields' parameter. All WordPress sites with this plugin installed are affected.

💻 Affected Systems

Products:
  • Business Directory Plugin – Easy Listing Directories for WordPress
Versions: All versions up to and including 6.4.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with the vulnerable plugin are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including user credentials, sensitive business data, and potential privilege escalation leading to full site takeover.

🟠

Likely Case

Extraction of sensitive data including user information, plugin settings, and potentially WordPress configuration details.

🟢

If Mitigated

Limited information disclosure if database permissions are properly restricted and sensitive data is encrypted.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable by unauthenticated attackers and affects publicly accessible WordPress sites.
🏢 Internal Only: MEDIUM - Internal WordPress sites are still vulnerable but have reduced attack surface compared to internet-facing instances.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Time-based SQL injection requires more sophisticated exploitation but is well-documented and tools exist for automation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3089626/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Business Directory Plugin'. 4. Click 'Update Now' if available. 5. Alternatively, download version 6.4.3+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate business-directory-plugin

Web Application Firewall Rule

all

Block requests containing SQL injection patterns targeting the listingfields parameter

🧯 If You Can't Patch

  • Implement strict WAF rules to block SQL injection patterns
  • Restrict database user permissions to limit potential damage from successful exploitation

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins

Check Version:

wp plugin get business-directory-plugin --field=version

Verify Fix Applied:

Verify plugin version is 6.4.3 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual database query patterns
  • Multiple requests with 'listingfields' parameter containing SQL keywords
  • Long response times from specific plugin endpoints

Network Indicators:

  • HTTP requests with SQL injection payloads in GET/POST parameters
  • Repeated requests to plugin endpoints with timing variations

SIEM Query:

source="web_logs" AND (uri_path="*business-directory*" OR user_agent="*sqlmap*") AND (query_string="*listingfields*" AND (query_string="*SLEEP*" OR query_string="*BENCHMARK*" OR query_string="*WAITFOR*"))

🔗 References

📤 Share & Export