CVE-2024-3217

HIGH

Wpdirectorykit WP Directory Kit < 1.3.1 - SQL Injection

Title source: rule
STIX 2.1

Description

The WP Directory Kit plugin for WordPress is vulnerable to SQL Injection via the 'attribute_value' and 'attribute_id' parameters in all versions up to, and including, 1.3.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Exploits (1)

nomisec WRITEUP 6 stars
by BassamAssiri · poc
https://github.com/BassamAssiri/CVE-2024-3217-POC

Scores

CVSS v3 8.8
EPSS 0.5350
EPSS Percentile 98.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-89
Status published
Products (2)
wpdirectorykit/WP Directory Kit < 1.3.0
wpdirectorykit/wp_directory_kit < 1.3.1
Published Apr 05, 2024
Tracked Since Feb 18, 2026