CVE-2025-1321
Published: 04 March 2025
Description
Adversaries may leverage databases to mine valuable information.
Security Summary
CVE-2025-1321, published on 2025-03-04, is an SQL injection vulnerability in the teachPress plugin for WordPress, affecting all versions up to and including 9.0.7. The flaw arises from insufficient escaping of the user-supplied 'order' parameter in the 'tpsearch' shortcode, combined with a lack of sufficient preparation in the existing SQL query. It carries a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) and maps to CWE-89.
Authenticated attackers with Contributor-level access or higher can exploit this vulnerability remotely with low complexity and no user interaction required. By injecting malicious payloads into the 'order' parameter, they can append additional SQL queries to existing ones, enabling the extraction of sensitive information from the database.
Mitigation guidance is provided in advisories from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/cb453fe3-ba89-437c-b3fb-9ec207eaa9f0?source=cve and the teachPress plugin's changeset 3246754 in the WordPress trac repository at https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3246754%40teachpress&new=3246754%40teachpress&sfp_email=&sfph_mail=#file6.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
SQL injection vulnerability in public-facing WordPress plugin directly enables remote exploitation of the application (T1190) and facilitates extraction of sensitive data from the database (T1213.006).