CVE-2025-30528
Published: 24 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-30528 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, in the Awesome Logos WordPress plugin developed by wpshopee. This flaw enables SQL Injection and affects all versions of the plugin from n/a through 1.2 inclusive. The vulnerability was published on 2025-03-24 and carries a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L), indicating critical severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and significant confidentiality impact.
An unauthenticated remote attacker can exploit this CSRF-to-SQL Injection vulnerability over the network. By tricking a victim into performing a malicious request—potentially without direct user interaction as scored—they can achieve high-impact unauthorized data disclosure through SQL queries, alongside low availability disruption. The scoped nature of the attack amplifies its potential within the affected context.
Mitigation guidance is detailed in the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/awesome-logos/vulnerability/wordpress-awesome-logos-plugin-1-2-csrf-to-sql-injection-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
CSRF-to-SQLi vulnerability in public-facing WordPress plugin directly enables T1190 Exploit Public-Facing Application for initial access and data disclosure.