The plugin does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based.
id: CVE-2024-3552
info:
name: Web Directory Free < 1.7.0 - SQL Injection
author: s4e-io
sever
...