CVE-2025-24759

CMSJunkie · CMSJunkie WP-BusinessDirectory

A critical vulnerability has been identified in the CMSJunkie WP-BusinessDirectory plugin for WordPress.

Executive summary

A critical vulnerability has been identified in the CMSJunkie WP-BusinessDirectory plugin for WordPress. This flaw, a Blind SQL Injection, allows a remote attacker to manipulate the website's database without needing to be an authenticated user. Successful exploitation could lead to the theft of sensitive information, such as user credentials and customer data, or a complete compromise of the affected website.

Vulnerability

The vulnerability is an Improper Neutralization of Special Elements used in an SQL Command, commonly known as a SQL Injection. The application fails to properly sanitize user-supplied input before it is used in a database query. An unauthenticated, remote attacker can craft malicious input, likely via a web form or URL parameter, to execute arbitrary SQL commands against the backend database. Because this is a "Blind" SQL Injection, the attacker does not receive direct output from the database but can infer data by sending a series of queries that result in observable differences in application response time or content, allowing them to systematically exfiltrate sensitive data.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.3. Exploitation poses a significant risk to the organization, potentially leading to a severe data breach. Consequences include the unauthorized disclosure of confidential data (e.g., user accounts, personal identifiable information, financial records), which can result in substantial reputational damage, loss of customer trust, and potential regulatory fines under data protection laws like GDPR. Depending on the database configuration, an attacker could also escalate privileges, modify or delete data, or potentially gain control over the underlying web server.

Remediation

Immediate Action: Immediately update the CMSJunkie WP-BusinessDirectory plugin to the latest version provided by the vendor. After patching, review web server and database access logs for any signs of exploitation that may have occurred prior to the update.

Proactive Monitoring: Implement monitoring to detect and alert on potential exploitation attempts. Look for suspicious web requests in logs that contain SQL keywords (SELECT, UNION, SLEEP, BENCHMARK), encoded special characters, or unusually long and complex query strings. Monitor for abnormal database load or response times, which can be symptomatic of time-based blind SQL injection attacks.

Compensating Controls: If patching cannot be performed immediately, deploy a Web Application Firewall (WAF) with a strict ruleset designed to detect and block SQL injection patterns. Additionally, ensure the database user account associated with the WordPress application has the minimum necessary permissions (principle of least privilege) to limit the impact of a potential compromise. Consider disabling the plugin temporarily if it is not business-critical until patching is possible.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the critical severity (CVSS 9.3) of this vulnerability, immediate action is required. All organizations using the CMSJunkie WP-BusinessDirectory plugin must prioritize applying the vendor-supplied patch immediately to prevent a potential data breach and system compromise. While this CVE is not yet on the CISA KEV list, its high severity and the prevalence of automated scanning for SQL injection flaws make it a prime target for exploitation. Proactive patching and vigilant monitoring are essential to mitigate the significant risk this vulnerability poses to the organization.