CVE-2024-6809

9.8 CRITICAL

📋 TL;DR

CVE-2024-6809 is a critical SQL injection vulnerability in the Simple Video Directory WordPress plugin that allows unauthenticated attackers to execute arbitrary SQL commands. This affects WordPress sites running vulnerable plugin versions, potentially compromising the entire database. Attackers can exploit this remotely without any authentication.

💻 Affected Systems

Products:
  • Simple Video Directory WordPress Plugin
Versions: All versions before 1.4.3
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default plugin configuration and requires no special setup to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, privilege escalation, remote code execution via database functions, and full site takeover.

🟠

Likely Case

Database information disclosure, user credential extraction, and potential administrative access to WordPress.

🟢

If Mitigated

Limited impact if proper WAF rules block SQL injection patterns and database permissions are restricted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward via crafted HTTP requests to vulnerable AJAX endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.3

Vendor Advisory: https://wpscan.com/vulnerability/60abcae5-4c89-4d48-95f8-6a80e5f06a37/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Simple Video Directory plugin. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 1.4.3 from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable AJAX endpoint

linux

Block access to the vulnerable AJAX action via .htaccess or web server configuration

# Add to .htaccess:
RewriteCond %{QUERY_STRING} action=simple_video_directory_ajax [NC]
RewriteRule ^ - [F]

Web Application Firewall rule

all

Implement WAF rules to block SQL injection patterns targeting the vulnerable parameter

🧯 If You Can't Patch

  • Disable or remove the Simple Video Directory plugin entirely
  • Implement strict network segmentation and limit external access to affected WordPress instances

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Simple Video Directory version number. If version is below 1.4.3, system is vulnerable.

Check Version:

wp plugin list --name=simple-video-directory --field=version

Verify Fix Applied:

Confirm plugin version is 1.4.3 or higher in WordPress admin panel. Test vulnerable AJAX endpoint with safe payload to ensure sanitization is working.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in WordPress debug logs
  • Multiple POST requests to /wp-admin/admin-ajax.php with SQL keywords
  • Unexpected database queries from web server process

Network Indicators:

  • HTTP POST requests containing SQL injection payloads to admin-ajax.php
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND uri="/wp-admin/admin-ajax.php" AND (request_body CONTAINS "UNION" OR request_body CONTAINS "SELECT" OR request_body CONTAINS "INSERT")

🔗 References

📤 Share & Export