CVE-2025-28904
📋 TL;DR
This SQL injection vulnerability in Shamalli Web Directory Free allows attackers to execute arbitrary SQL commands through the application. It affects all WordPress sites running Web Directory Free plugin versions up to 1.7.6, potentially exposing database contents.
💻 Affected Systems
- Shamalli Web Directory Free WordPress Plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including sensitive user data, admin credentials, and potential remote code execution via database functions.
Likely Case
Data exfiltration, privilege escalation, and unauthorized access to directory listings and user information.
If Mitigated
Limited data exposure if database permissions are properly restricted and input validation is enforced elsewhere.
🎯 Exploit Status
Blind SQL injection suggests exploitation requires inference techniques but automated tools exist.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.7.7 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Web Directory Free and click Update Now. 4. Verify version is 1.7.7 or higher.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patched.
wp plugin deactivate web-directory-free
WAF Rule
allImplement web application firewall rules to block SQL injection patterns.
🧯 If You Can't Patch
- Implement strict input validation and parameterized queries in custom code
- Restrict database user permissions to minimum required operations
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Web Directory Free version number.
Check Version:
wp plugin get web-directory-free --field=version
Verify Fix Applied:
Confirm plugin version is 1.7.7 or higher and test directory functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in web server logs
- Multiple failed login attempts from single IP
- Suspicious parameter values in URL queries
Network Indicators:
- Unusual database connection patterns
- Large volume of requests to directory endpoints
SIEM Query:
source="web_logs" AND ("sql" OR "syntax" OR "union") AND "web-directory"