CVE-2025-10003: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in stiofansisland UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP
The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘upload_file_remove’ function and 'htmlvar' parameter in all versions up to, and including, 1.2.44 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
CVE-2025-10003 is a medium-severity SQL Injection vulnerability identified in the UsersWP WordPress plugin, specifically affecting versions up to and including 1.2.44. This plugin provides front-end login forms, user registration, user profile management, and a members directory for WordPress sites. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89), particularly in the 'upload_file_remove' function and the 'htmlvar' parameter. Due to insufficient escaping of user-supplied input and lack of proper query preparation, unauthenticated attackers can inject malicious SQL code. This injection is time-based, meaning attackers can infer data by measuring response delays, enabling them to extract sensitive database information without authentication or user interaction. The CVSS 3.1 score is 6.5, reflecting a medium severity with a network attack vector, low attack complexity, requiring low privileges but no user interaction, and impacting confidentiality but not integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects all versions of the plugin up to 1.2.44, making it critical for site administrators using this plugin to assess exposure and apply mitigations promptly.
Potential Impact
For European organizations, this vulnerability poses a significant risk to WordPress-based websites that utilize the UsersWP plugin. Exploitation can lead to unauthorized disclosure of sensitive user data, including personal information stored in the database, which may include names, emails, and other profile details. This can result in privacy breaches violating GDPR regulations, potentially leading to legal penalties and reputational damage. Additionally, extracted data could be used for further attacks such as phishing or identity theft. Since the vulnerability does not affect data integrity or availability directly, the primary concern is confidentiality compromise. However, the ease of exploitation without authentication increases the threat level, especially for organizations with public-facing WordPress sites relying on this plugin. The lack of known exploits in the wild suggests limited current active exploitation, but the vulnerability’s presence in a popular CMS plugin makes it a likely target for attackers once publicized.
Mitigation Recommendations
1. Immediate mitigation involves updating the UsersWP plugin to a patched version once available. Until then, consider disabling or removing the plugin if feasible. 2. Implement Web Application Firewall (WAF) rules specifically targeting SQL injection patterns related to the 'upload_file_remove' function and 'htmlvar' parameter to block malicious requests. 3. Employ input validation and sanitization at the application level, ensuring that all user inputs are properly escaped or parameterized before database queries. 4. Monitor web server and database logs for unusual query patterns or repeated access attempts to the vulnerable endpoints. 5. Restrict database user permissions to the minimum necessary to limit the impact of potential SQL injection. 6. Conduct regular security assessments and penetration testing focusing on WordPress plugins and custom code to detect similar vulnerabilities. 7. Educate site administrators about the risks of outdated plugins and the importance of timely updates.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-10003: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in stiofansisland UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP
Description
The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘upload_file_remove’ function and 'htmlvar' parameter in all versions up to, and including, 1.2.44 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Technical Analysis
CVE-2025-10003 is a medium-severity SQL Injection vulnerability identified in the UsersWP WordPress plugin, specifically affecting versions up to and including 1.2.44. This plugin provides front-end login forms, user registration, user profile management, and a members directory for WordPress sites. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89), particularly in the 'upload_file_remove' function and the 'htmlvar' parameter. Due to insufficient escaping of user-supplied input and lack of proper query preparation, unauthenticated attackers can inject malicious SQL code. This injection is time-based, meaning attackers can infer data by measuring response delays, enabling them to extract sensitive database information without authentication or user interaction. The CVSS 3.1 score is 6.5, reflecting a medium severity with a network attack vector, low attack complexity, requiring low privileges but no user interaction, and impacting confidentiality but not integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects all versions of the plugin up to 1.2.44, making it critical for site administrators using this plugin to assess exposure and apply mitigations promptly.
Potential Impact
For European organizations, this vulnerability poses a significant risk to WordPress-based websites that utilize the UsersWP plugin. Exploitation can lead to unauthorized disclosure of sensitive user data, including personal information stored in the database, which may include names, emails, and other profile details. This can result in privacy breaches violating GDPR regulations, potentially leading to legal penalties and reputational damage. Additionally, extracted data could be used for further attacks such as phishing or identity theft. Since the vulnerability does not affect data integrity or availability directly, the primary concern is confidentiality compromise. However, the ease of exploitation without authentication increases the threat level, especially for organizations with public-facing WordPress sites relying on this plugin. The lack of known exploits in the wild suggests limited current active exploitation, but the vulnerability’s presence in a popular CMS plugin makes it a likely target for attackers once publicized.
Mitigation Recommendations
1. Immediate mitigation involves updating the UsersWP plugin to a patched version once available. Until then, consider disabling or removing the plugin if feasible. 2. Implement Web Application Firewall (WAF) rules specifically targeting SQL injection patterns related to the 'upload_file_remove' function and 'htmlvar' parameter to block malicious requests. 3. Employ input validation and sanitization at the application level, ensuring that all user inputs are properly escaped or parameterized before database queries. 4. Monitor web server and database logs for unusual query patterns or repeated access attempts to the vulnerable endpoints. 5. Restrict database user permissions to the minimum necessary to limit the impact of potential SQL injection. 6. Conduct regular security assessments and penetration testing focusing on WordPress plugins and custom code to detect similar vulnerabilities. 7. Educate site administrators about the risks of outdated plugins and the importance of timely updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-04T18:27:06.623Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb9c18535f4a97731dab4f
Added to database: 9/6/2025, 2:27:36 AM
Last enriched: 9/6/2025, 2:43:17 AM
Last updated: 9/7/2025, 6:16:33 PM
Views: 13
Related Threats
CVE-2025-48042: CWE-863 Incorrect Authorization in ash-project ash
HighCVE-2025-10068: SQL Injection in itsourcecode Online Discussion Forum
MediumCVE-2025-10067: Cross Site Scripting in itsourcecode POS Point of Sale System
MediumCVE-2025-10066: Cross Site Scripting in itsourcecode POS Point of Sale System
MediumCVE-2025-36100: CWE-260 Password in Configuration File in IBM MQ
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.