CVE-2025-28904

9.3 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Shamalli Web Directory Free allows attackers to execute arbitrary SQL commands through the application. It affects all WordPress sites running Web Directory Free plugin versions up to 1.7.6, potentially exposing database contents.

💻 Affected Systems

Products:
  • Shamalli Web Directory Free WordPress Plugin
Versions: n/a through 1.7.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive user data, admin credentials, and potential remote code execution via database functions.

🟠

Likely Case

Data exfiltration, privilege escalation, and unauthorized access to directory listings and user information.

🟢

If Mitigated

Limited data exposure if database permissions are properly restricted and input validation is enforced elsewhere.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Blind SQL injection suggests exploitation requires inference techniques but automated tools exist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.7 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/web-directory-free/vulnerability/wordpress-web-directory-free-plugin-1-7-6-sql-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Web Directory Free and click Update Now. 4. Verify version is 1.7.7 or higher.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate web-directory-free

WAF Rule

all

Implement web application firewall rules to block SQL injection patterns.

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in custom code
  • Restrict database user permissions to minimum required operations

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Web Directory Free version number.

Check Version:

wp plugin get web-directory-free --field=version

Verify Fix Applied:

Confirm plugin version is 1.7.7 or higher and test directory functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in web server logs
  • Multiple failed login attempts from single IP
  • Suspicious parameter values in URL queries

Network Indicators:

  • Unusual database connection patterns
  • Large volume of requests to directory endpoints

SIEM Query:

source="web_logs" AND ("sql" OR "syntax" OR "union") AND "web-directory"

🔗 References

📤 Share & Export