CVE-2025-23779
Published: 16 January 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-23779 is an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability, classified under CWE-89, affecting the ResAds WordPress plugin developed by web-mv. The issue impacts ResAds versions from unknown initial release through 2.0.5, allowing SQL Injection via the resads component.
Attackers with high privileges required (PR:H) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation changes scope (S:C), enabling high confidentiality impact (C:H) such as unauthorized data access, with no integrity impact (I:N) and low availability impact (A:L), resulting in a CVSS v3.1 base score of 7.6.
The Patchstack advisory provides details on this WordPress ResAds plugin vulnerability, including mitigation recommendations for versions up to 2.0.5, available at https://patchstack.com/database/Wordpress/Plugin/resads/vulnerability/wordpress-resads-plugin-2-0-5-sql-injection-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
SQL injection vulnerability in public-facing WordPress plugin directly enables T1190 (Exploit Public-Facing Application) for unauthorized database data access.