{"id":86686,"date":"2026-03-14T15:17:11","date_gmt":"2026-03-14T15:17:11","guid":{"rendered":""},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-30T06:00:00","slug":"cve-2024-13507-time-based-sql-injection-vulnerability-in-geodirectory-and-classified-listings-directory-wordpress-plugins","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2024-13507-time-based-sql-injection-vulnerability-in-geodirectory-and-classified-listings-directory-wordpress-plugins\/","title":{"rendered":"<strong>CVE-2024-13507: Time-Based SQL Injection Vulnerability in GeoDirectory and Classified Listings Directory WordPress Plugins<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The GeoDirectory and Classified Listings Directory plugins for WordPress have been found to contain a time-based SQL injection vulnerability. This vulnerability, assigned the identifier CVE-2024-13507, affects all versions of the plugins up to and including 2.8.97. Due to the nature of this vulnerability, unauthenticated attackers could extract sensitive information from the database, leading to potential system compromise or data leakage. This report serves to provide a detailed overview of the vulnerability, its impact, and mitigation guidance.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2024-13507<br \/>\nSeverity: High (7.5 CVSS Score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: System Compromise, Data Leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-746655195\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>GeoDirectory &#8211; WP Business Directory Plugin | Up to and including 2.8.97<br \/>\nClassified Listings Directory Plugin for WordPress | Up to and including 2.8.97<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The vulnerability lies in the handling of the &#8216;dist&#8217; parameter within the plugins. Due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query, an attacker can manipulate the &#8216;dist&#8217; parameter to append additional SQL queries to the existing ones. This allows an unauthenticated attacker to extract sensitive information from the database.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-3513862040\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Below is a<br \/>\n<strong>conceptual<\/strong><br \/>\n example of how the vulnerability might be exploited. This could be a sample HTTP GET request, where the &#8216;dist&#8217; parameter is manipulated to execute a malicious SQL query.<\/p>\n<pre><code class=\"\" data-line=\"\">GET \/vulnerable_page.php?dist=1&#039; UNION ALL SELECT null,@@version-- HTTP\/1.1\nHost: target.example.com<\/code><\/pre>\n<p>In this example, the &#8220;dist&#8221; parameter is manipulated to execute a UNION SQL command, retrieving database version information. In a real attack, the SQL query could be customized to retrieve more sensitive information or even manipulate the database.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>To mitigate this vulnerability, it is recommended that users update their GeoDirectory and Classified Listings Directory WordPress plugins to the latest version. If an update is not immediately possible, the use of a Web Application Firewall (WAF) or Intrusion Detection System (IDS) may provide temporary mitigation by identifying and blocking malicious SQL injection attempts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The GeoDirectory and Classified Listings Directory plugins for WordPress have been found to contain a time-based SQL injection vulnerability. This vulnerability, assigned the identifier CVE-2024-13507, affects all versions of the plugins up to and including 2.8.97. Due to the nature of this vulnerability, unauthenticated attackers could extract sensitive information from the database, leading to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-86686","post","type-post","status-publish","format-standard","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/86686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=86686"}],"version-history":[{"count":0,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/86686\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=86686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=86686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=86686"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=86686"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=86686"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=86686"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=86686"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=86686"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=86686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}