Cyber Posture

CVE-2025-23779

High

Published: 16 January 2025

Published
16 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
EPSS Score 0.0026 49.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-23779 is an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability, classified under CWE-89, affecting the ResAds WordPress plugin developed by web-mv. The issue impacts ResAds versions from unknown initial release through 2.0.5, allowing SQL Injection via the resads component.

Attackers with high privileges required (PR:H) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation changes scope (S:C), enabling high confidentiality impact (C:H) such as unauthorized data access, with no integrity impact (I:N) and low availability impact (A:L), resulting in a CVSS v3.1 base score of 7.6.

The Patchstack advisory provides details on this WordPress ResAds plugin vulnerability, including mitigation recommendations for versions up to 2.0.5, available at https://patchstack.com/database/Wordpress/Plugin/resads/vulnerability/wordpress-resads-plugin-2-0-5-sql-injection-vulnerability?_s_id=cve.

Details

CWE(s)
CWE-89

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection vulnerability in public-facing WordPress plugin directly enables T1190 (Exploit Public-Facing Application) for unauthorized database data access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References