Cyber Posture

CVE-2025-10738

Critical

Published: 13 December 2025

Published
13 December 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 31.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

The URL Shortener Plugin For WordPress plugin for WordPress is vulnerable to SQL Injection via the ‘analytic_id’ parameter in all versions up to, and including, 3.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation…

more

on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation and sanitization of user-supplied parameters like 'analytic_id' to prevent SQL injection by ensuring inputs are properly escaped and prepared in SQL queries.

prevent

Mandates identification, reporting, and correction of flaws such as the SQL injection vulnerability in the WordPress plugin through timely patching or updates.

detectrespond

Provides vulnerability scanning to identify SQL injection flaws in plugins like Exact Links before exploitation, enabling proactive remediation.

Security SummaryAI

CVE-2025-10738 is a SQL injection vulnerability (CWE-89) in the URL Shortener Plugin for WordPress, known as Exact Links, affecting all versions up to and including 3.0.7. The issue stems from insufficient escaping of the user-supplied 'analytic_id' parameter and lack of proper preparation in existing SQL queries within the plugin's LinkAnalytics.php model.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By appending malicious SQL queries to legitimate ones, they can extract sensitive information from the database.

Mitigation details are available in advisories such as the Wordfence threat intelligence report and the plugin's official WordPress.org page. The vulnerable code can be reviewed in the plugin's Trac repository at the specified revision.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing WordPress plugin enables exploitation of public-facing application (T1190) and direct extraction of sensitive data from databases (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References