Cyber Posture

CVE-2025-30819

High

Published: 27 March 2025

Published
27 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 8.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
EPSS Score 0.0018 39.2th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-30819 is an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability, classified under CWE-89, in the Simple Giveaways WordPress plugin (giveasap) developed by Igor Benic. This issue affects all versions of the plugin from n/a through 2.48.1.

The vulnerability carries a CVSS v3.1 base score of 8.5 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L), meaning it is exploitable over the network with low attack complexity by low-privileged users, requiring no user interaction. Attackers can achieve high confidentiality impact, such as unauthorized access to sensitive data in the database, low availability impact, and a change in scope, while integrity impact is none.

Patchstack has documented this SQL Injection vulnerability in the WordPress Simple Giveaways plugin version 2.48.1, providing details in their vulnerability database for mitigation guidance.

Details

CWE(s)
CWE-89

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL Injection vulnerability in public-facing WordPress plugin directly enables network exploitation of the application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References