Cyber Posture

CVE-2025-2106

High

Published: 13 March 2025

Published
13 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0018 38.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may leverage databases to mine valuable information.

Security Summary

CVE-2025-2106 is a SQL injection vulnerability in the ArielBrailovsky-ViralAd plugin for WordPress, affecting all versions up to and including 1.0.8. The flaw exists in the limpia() function due to insufficient escaping of the user-supplied 'text' and 'id' parameters and lack of proper preparation in the existing SQL query, allowing injection of additional SQL queries. This issue is classified under CWE-89 with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and is only exploitable on very old versions of WordPress.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity by sending crafted requests containing malicious SQL payloads via the vulnerable parameters. Successful exploitation enables appending arbitrary SQL queries to existing ones, potentially allowing extraction of sensitive information from the database, such as user credentials or other confidential data.

Advisories from Wordfence detail the vulnerability in their threat intelligence report, highlighting the specific code location in inc/anuncio.php at line 174. The WordPress plugin directory page for ArielBrailovsky-ViralAd provides access to the plugin for review, and mitigation involves updating to a patched version if available or removing the plugin, alongside ensuring WordPress is not running a very old version susceptible to exploitation.

Details

CWE(s)
CWE-89

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing WordPress plugin enables remote exploitation (T1190) and direct database data extraction (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References