Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0866: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in torviswesley Legoeso PDF Manager

0
Medium
VulnerabilityCVE-2025-0866cvecve-2025-0866cwe-89
Published: Thu Feb 20 2025 (02/20/2025, 09:21:38 UTC)
Source: CVE Database V5
Vendor/Project: torviswesley
Product: Legoeso PDF Manager

Description

CVE-2025-0866 is a medium severity SQL Injection vulnerability in the Legoeso PDF Manager WordPress plugin up to version 1. 2. 2. It arises from improper neutralization of special elements in the 'checkedVals' parameter, allowing authenticated users with Author-level access or higher to inject malicious SQL queries. This vulnerability enables attackers to extract sensitive database information without requiring user interaction. Exploitation requires network access and authentication but no user interaction. No known exploits are currently reported in the wild. The vulnerability impacts confidentiality but not integrity or availability. Organizations using this plugin should prioritize patching or applying mitigations to prevent data leakage. Countries with significant WordPress usage and plugin adoption are at higher risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:58:28 UTC

Technical Analysis

CVE-2025-0866 is a time-based SQL Injection vulnerability identified in the Legoeso PDF Manager plugin for WordPress, affecting all versions up to and including 1.2.2. The root cause is insufficient escaping and lack of proper query preparation on the 'checkedVals' parameter, which is user-supplied. Authenticated attackers with Author-level privileges or higher can exploit this flaw by injecting additional SQL commands into existing queries. This injection allows attackers to perform time-based blind SQL Injection attacks, enabling extraction of sensitive information from the backend database. The vulnerability does not require user interaction but does require authentication, which limits the attacker scope to users with some level of access. The CVSS v3.1 score is 6.5 (medium), reflecting network attack vector, low attack complexity, and high confidentiality impact, but no impact on integrity or availability. No patches or known exploits are currently available, increasing the urgency for users to monitor for updates or apply workarounds. The vulnerability is classified under CWE-89, indicating improper neutralization of special elements in SQL commands.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of sensitive data stored in the WordPress database, which may include user credentials, personal information, or site configuration details. Since the attack requires authenticated access at the Author level or above, the risk is limited to scenarios where attackers have compromised or obtained legitimate user credentials. However, many WordPress sites grant Author or higher privileges to multiple users, increasing the attack surface. Exploitation could lead to data breaches, loss of user trust, and potential compliance violations. The vulnerability does not affect data integrity or availability, so it is less likely to cause site defacement or downtime. Nonetheless, the ability to extract sensitive data can facilitate further attacks or lateral movement within the network. Organizations relying on this plugin for document management should consider the risk to their data confidentiality and take immediate action to mitigate exposure.

Mitigation Recommendations

1. Immediately restrict Author-level and higher privileges to trusted users only, minimizing the number of accounts that can exploit this vulnerability. 2. Monitor and audit user activities for suspicious behavior, especially SQL query anomalies or unusual data access patterns. 3. If possible, disable or uninstall the Legoeso PDF Manager plugin until a security patch is released. 4. Implement Web Application Firewall (WAF) rules to detect and block SQL Injection attempts targeting the 'checkedVals' parameter. 5. Encourage the vendor to release a patched version with proper parameterized queries or prepared statements to eliminate SQL Injection risks. 6. Regularly update WordPress core and plugins to the latest versions once patches become available. 7. Use database permissions to limit the scope of queries that can be executed by the WordPress application user, reducing potential data exposure. 8. Educate site administrators and users about the risks of privilege escalation and credential compromise to prevent unauthorized access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-29T22:54:27.229Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b6cb7ef31ef0b5554ce

Added to database: 2/25/2026, 9:36:44 PM

Last enriched: 2/25/2026, 11:58:28 PM

Last updated: 2/26/2026, 9:49:54 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats