Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0861: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in vruizg VR-Frases (collect & share quotes)

0
Medium
VulnerabilityCVE-2025-0861cvecve-2025-0861cwe-89
Published: Thu Jan 30 2025 (01/30/2025, 09:21:58 UTC)
Source: CVE Database V5
Vendor/Project: vruizg
Product: VR-Frases (collect & share quotes)

Description

CVE-2025-0861 is a medium severity SQL Injection vulnerability in the VR-Frases WordPress plugin (versions up to 3. 0. 1). It allows unauthenticated attackers to inject malicious SQL commands via multiple parameters due to improper input sanitization and lack of prepared statements. Exploitation can lead to unauthorized disclosure of sensitive database information. No known exploits are currently reported in the wild. The vulnerability requires no user interaction but does require the attacker to be unauthenticated, making it remotely exploitable over the network. Organizations using this plugin should prioritize patching or applying mitigations to prevent data leakage. The CVSS score is 4. 9, reflecting moderate impact primarily on confidentiality.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:57:08 UTC

Technical Analysis

CVE-2025-0861 identifies a SQL Injection vulnerability in the VR-Frases (collect & share quotes) WordPress plugin developed by vruizg. This vulnerability affects all versions up to and including 3.0.1. The root cause is insufficient escaping of user-supplied parameters and the absence of prepared statements in the plugin's SQL queries. This improper neutralization of special elements (CWE-89) allows an unauthenticated attacker to append arbitrary SQL commands to existing queries. As a result, attackers can extract sensitive information from the backend database, such as user data or site configuration details. The vulnerability is remotely exploitable without user interaction, increasing its risk profile. Despite the moderate CVSS score of 4.9, the impact on confidentiality is high, while integrity and availability are not affected. No patches or official fixes are currently linked, and no known exploits have been observed in the wild. The vulnerability was published on January 30, 2025, and assigned by Wordfence. Given the widespread use of WordPress and its plugins, this vulnerability could be leveraged in targeted attacks against vulnerable sites.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of sensitive database information, which can include user credentials, personal data, or other confidential content stored by the affected WordPress site. This can lead to privacy violations, reputational damage, and potential compliance issues for organizations. Although the vulnerability does not affect data integrity or availability, the exposure of sensitive data can facilitate further attacks such as credential stuffing, phishing, or privilege escalation. Since the exploit requires no authentication or user interaction, attackers can automate exploitation attempts at scale. Organizations running the VR-Frases plugin on publicly accessible WordPress sites are at risk, especially if they have not applied any mitigations. The lack of known exploits in the wild currently reduces immediate risk, but the vulnerability remains a significant concern until patched.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit their WordPress installations for the presence of the VR-Frases plugin and its version. If possible, update the plugin to a fixed version once released by the vendor. In the absence of an official patch, administrators should consider disabling or uninstalling the plugin to eliminate the attack surface. Applying Web Application Firewall (WAF) rules that detect and block SQL Injection patterns targeting the plugin’s parameters can provide temporary protection. Additionally, database permissions should be minimized to restrict the plugin’s access to only necessary data, limiting potential exposure. Regularly monitoring logs for suspicious SQL query patterns or unusual database access can help detect exploitation attempts. Finally, educating site administrators on secure plugin management and timely patching is critical to prevent exploitation of similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-29T21:18:03.503Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b6cb7ef31ef0b5554b0

Added to database: 2/25/2026, 9:36:44 PM

Last enriched: 2/25/2026, 11:57:08 PM

Last updated: 2/26/2026, 9:32:57 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats