Cyber Posture

CVE-2025-1321

Medium

Published: 04 March 2025

Published
04 March 2025
Modified
05 March 2025
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0007 20.5th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may leverage databases to mine valuable information.

Security Summary

CVE-2025-1321, published on 2025-03-04, is an SQL injection vulnerability in the teachPress plugin for WordPress, affecting all versions up to and including 9.0.7. The flaw arises from insufficient escaping of the user-supplied 'order' parameter in the 'tpsearch' shortcode, combined with a lack of sufficient preparation in the existing SQL query. It carries a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) and maps to CWE-89.

Authenticated attackers with Contributor-level access or higher can exploit this vulnerability remotely with low complexity and no user interaction required. By injecting malicious payloads into the 'order' parameter, they can append additional SQL queries to existing ones, enabling the extraction of sensitive information from the database.

Mitigation guidance is provided in advisories from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/cb453fe3-ba89-437c-b3fb-9ec207eaa9f0?source=cve and the teachPress plugin's changeset 3246754 in the WordPress trac repository at https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3246754%40teachpress&new=3246754%40teachpress&sfp_email=&sfph_mail=#file6.

Details

CWE(s)
CWE-89

Affected Products

mtrv
teachpress
≤ 9.0.8

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection vulnerability in public-facing WordPress plugin directly enables remote exploitation of the application (T1190) and facilitates extraction of sensitive data from the database (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References