CVE-2025-25151
Published: 07 February 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-25151 is an improper neutralization of special elements used in an SQL command, classified as an SQL Injection vulnerability (CWE-89), affecting the Stylemix uListing plugin for WordPress. This issue impacts all versions of uListing from n/a through 2.1.6 inclusive. The vulnerability was published on 2025-02-07 and carries a CVSS v3.1 base score of 8.5 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L).
Low-privileged remote attackers (PR:L) can exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation changes the scope to the server (S:C), enabling high-impact confidentiality breaches such as unauthorized access to sensitive data (C:H), alongside low impacts on integrity (I:N) and availability (A:L).
Patchstack has documented this SQL Injection vulnerability specifically in the WordPress uListing plugin version 2.1.6, providing details via their vulnerability database.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
SQL injection vulnerability in a public-facing WordPress plugin directly enables exploitation of public-facing applications over the network.