CVE-2025-10002: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in clickwhale ClickWhale – Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages
The ClickWhale – Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages plugin for WordPress is vulnerable to SQL Injection via the export_csv() function in all versions up to, and including, 2.5.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This may be exploitable by lower level users if access to the plugin is granted.
AI Analysis
Technical Summary
CVE-2025-10002 is a medium-severity SQL Injection vulnerability affecting the ClickWhale WordPress plugin, which is used for managing links, shortening URLs, and tracking affiliate link clicks. The vulnerability exists in the export_csv() function across all versions up to and including 2.5.0. The root cause is insufficient sanitization and escaping of user-supplied parameters combined with a lack of proper query preparation. This allows an authenticated attacker with Administrator-level privileges or higher to inject arbitrary SQL code into existing queries. The injection can be used to extract sensitive data from the underlying database, compromising confidentiality. Although the vulnerability requires high privileges, it may be exploitable by lower-privileged users if they have access to the plugin interface. The CVSS 3.1 score is 4.9 (medium), reflecting network attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No known exploits are reported in the wild yet. The vulnerability highlights the importance of proper input validation and use of parameterized queries in WordPress plugins handling sensitive data exports.
Potential Impact
For European organizations using WordPress with the ClickWhale plugin, this vulnerability poses a risk of unauthorized data disclosure from their databases. Since the exploit requires administrator-level access, the threat is primarily from insider threats or attackers who have already compromised admin credentials. Successful exploitation could lead to leakage of sensitive affiliate tracking data, user information, or other confidential business data stored in the database. This could result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data exposure), and financial losses. Organizations relying on affiliate marketing and link tracking may face operational disruptions if data integrity is questioned. The medium severity score indicates a moderate risk, but the impact on confidentiality is significant enough to warrant prompt remediation. The lack of known exploits reduces immediate risk but should not lead to complacency.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations for the presence of the ClickWhale plugin and verify the version in use. If running version 2.5.0 or earlier, they should disable the plugin until a patched version is available or apply any vendor-provided fixes. In the absence of official patches, organizations can mitigate risk by restricting plugin access strictly to trusted administrators and monitoring for unusual database queries or export activities. Implementing Web Application Firewalls (WAFs) with SQL injection detection rules can provide additional protection. Regularly reviewing and rotating administrator credentials, enforcing multi-factor authentication, and limiting plugin usage to only necessary users will reduce exploitation likelihood. Additionally, organizations should consider database activity monitoring to detect anomalous query patterns indicative of injection attempts. Finally, maintaining up-to-date backups and an incident response plan will help mitigate potential damage if exploitation occurs.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10002: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in clickwhale ClickWhale – Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages
Description
The ClickWhale – Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages plugin for WordPress is vulnerable to SQL Injection via the export_csv() function in all versions up to, and including, 2.5.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This may be exploitable by lower level users if access to the plugin is granted.
AI-Powered Analysis
Technical Analysis
CVE-2025-10002 is a medium-severity SQL Injection vulnerability affecting the ClickWhale WordPress plugin, which is used for managing links, shortening URLs, and tracking affiliate link clicks. The vulnerability exists in the export_csv() function across all versions up to and including 2.5.0. The root cause is insufficient sanitization and escaping of user-supplied parameters combined with a lack of proper query preparation. This allows an authenticated attacker with Administrator-level privileges or higher to inject arbitrary SQL code into existing queries. The injection can be used to extract sensitive data from the underlying database, compromising confidentiality. Although the vulnerability requires high privileges, it may be exploitable by lower-privileged users if they have access to the plugin interface. The CVSS 3.1 score is 4.9 (medium), reflecting network attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No known exploits are reported in the wild yet. The vulnerability highlights the importance of proper input validation and use of parameterized queries in WordPress plugins handling sensitive data exports.
Potential Impact
For European organizations using WordPress with the ClickWhale plugin, this vulnerability poses a risk of unauthorized data disclosure from their databases. Since the exploit requires administrator-level access, the threat is primarily from insider threats or attackers who have already compromised admin credentials. Successful exploitation could lead to leakage of sensitive affiliate tracking data, user information, or other confidential business data stored in the database. This could result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data exposure), and financial losses. Organizations relying on affiliate marketing and link tracking may face operational disruptions if data integrity is questioned. The medium severity score indicates a moderate risk, but the impact on confidentiality is significant enough to warrant prompt remediation. The lack of known exploits reduces immediate risk but should not lead to complacency.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations for the presence of the ClickWhale plugin and verify the version in use. If running version 2.5.0 or earlier, they should disable the plugin until a patched version is available or apply any vendor-provided fixes. In the absence of official patches, organizations can mitigate risk by restricting plugin access strictly to trusted administrators and monitoring for unusual database queries or export activities. Implementing Web Application Firewalls (WAFs) with SQL injection detection rules can provide additional protection. Regularly reviewing and rotating administrator credentials, enforcing multi-factor authentication, and limiting plugin usage to only necessary users will reduce exploitation likelihood. Additionally, organizations should consider database activity monitoring to detect anomalous query patterns indicative of injection attempts. Finally, maintaining up-to-date backups and an incident response plan will help mitigate potential damage if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-04T18:21:57.134Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68cf42444a0b186b9321b035
Added to database: 9/21/2025, 12:09:40 AM
Last enriched: 9/21/2025, 12:10:10 AM
Last updated: 9/21/2025, 12:10:19 AM
Views: 2
Related Threats
CVE-2025-10759: Authorization Bypass in Webkul QloApps
MediumCVE-2025-10758: Cross Site Scripting in htmly
MediumCVE-2025-9949: CWE-352 Cross-Site Request Forgery (CSRF) in webraketen Internal Links Manager
MediumCVE-2025-10489: CWE-862 Missing Authorization in brainstormforce SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more
MediumCVE-2025-10305: CWE-862 Missing Authorization in endisha Secure Passkeys
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.