Cyber Posture

CVE-2025-30879

High

Published: 27 March 2025

Published
27 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
EPSS Score 0.0021 43.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-30879 is an SQL Injection vulnerability stemming from improper neutralization of special elements used in an SQL command (CWE-89). It affects the MC Woocommerce Wishlist plugin, also known as smart-wishlist-for-more-convert, developed by the Moreconvert Team. The issue impacts all versions from n/a through 1.8.9 and was published on 2025-03-27.

The vulnerability carries a CVSS v3.1 base score of 7.6 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L). High-privileged users can exploit it remotely with low attack complexity and no user interaction required. Successful exploitation enables high-impact confidentiality violations, such as unauthorized data access, alongside low availability impact and a changed scope.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/smart-wishlist-for-more-convert/vulnerability/wordpress-mc-woocommerce-wishlist-plugin-1-8-9-sql-injection-vulnerability?_s_id=cve provides details on this WordPress plugin vulnerability. Security practitioners should review it for recommended mitigations.

Details

CWE(s)
CWE-89

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection vulnerability in a publicly accessible WordPress plugin directly enables exploitation of public-facing applications for unauthorized data access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References