CVE-2025-10738
Published: 13 December 2025
Description
The URL Shortener Plugin For WordPress plugin for WordPress is vulnerable to SQL Injection via the ‘analytic_id’ parameter in all versions up to, and including, 3.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation…
more
on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation and sanitization of user-supplied parameters like 'analytic_id' to prevent SQL injection by ensuring inputs are properly escaped and prepared in SQL queries.
Mandates identification, reporting, and correction of flaws such as the SQL injection vulnerability in the WordPress plugin through timely patching or updates.
Provides vulnerability scanning to identify SQL injection flaws in plugins like Exact Links before exploitation, enabling proactive remediation.
Security SummaryAI
CVE-2025-10738 is a SQL injection vulnerability (CWE-89) in the URL Shortener Plugin for WordPress, known as Exact Links, affecting all versions up to and including 3.0.7. The issue stems from insufficient escaping of the user-supplied 'analytic_id' parameter and lack of proper preparation in existing SQL queries within the plugin's LinkAnalytics.php model.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By appending malicious SQL queries to legitimate ones, they can extract sensitive information from the database.
Mitigation details are available in advisories such as the Wordfence threat intelligence report and the plugin's official WordPress.org page. The vulnerable code can be reviewed in the plugin's Trac repository at the specified revision.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing WordPress plugin enables exploitation of public-facing application (T1190) and direct extraction of sensitive data from databases (T1213.006).