Cyber Posture

CVE-2025-26915

High

Published: 25 February 2025

Published
25 February 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 8.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
EPSS Score 0.0005 16.8th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-26915 is an improper neutralization of special elements used in an SQL command, classified as an SQL Injection vulnerability (CWE-89), in the PickPlugins Wishlist WordPress plugin. This issue affects Wishlist versions from n/a through 1.0.41.

The vulnerability carries a CVSS v3.1 base score of 8.5 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L), indicating network accessibility, low attack complexity, and exploitation by low-privileged authenticated users without requiring user interaction. Attackers can leverage it to achieve high confidentiality impact through data extraction, low availability impact, and a change in scope that may affect other system components.

The Patchstack advisory provides further details on this WordPress Wishlist plugin 1.0.41 SQL Injection vulnerability, including vulnerability specifics and mitigation guidance, accessible at https://patchstack.com/database/Wordpress/Plugin/wishlist/vulnerability/wordpress-wishlist-plugin-1-0-41-sql-injection-vulnerability?_s_id=cve.

Details

CWE(s)
CWE-89

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in public-facing WordPress plugin directly enables exploitation of the application for data extraction from the database.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References