Skip to main content

CVE-2025-10003: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in stiofansisland UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP

Medium
VulnerabilityCVE-2025-10003cvecve-2025-10003cwe-89
Published: Sat Sep 06 2025 (09/06/2025, 02:24:19 UTC)
Source: CVE Database V5
Vendor/Project: stiofansisland
Product: UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP

Description

The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘upload_file_remove’ function and 'htmlvar' parameter in all versions up to, and including, 1.2.44 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 09/06/2025, 02:43:17 UTC

Technical Analysis

CVE-2025-10003 is a medium-severity SQL Injection vulnerability identified in the UsersWP WordPress plugin, specifically affecting versions up to and including 1.2.44. This plugin provides front-end login forms, user registration, user profile management, and a members directory for WordPress sites. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89), particularly in the 'upload_file_remove' function and the 'htmlvar' parameter. Due to insufficient escaping of user-supplied input and lack of proper query preparation, unauthenticated attackers can inject malicious SQL code. This injection is time-based, meaning attackers can infer data by measuring response delays, enabling them to extract sensitive database information without authentication or user interaction. The CVSS 3.1 score is 6.5, reflecting a medium severity with a network attack vector, low attack complexity, requiring low privileges but no user interaction, and impacting confidentiality but not integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects all versions of the plugin up to 1.2.44, making it critical for site administrators using this plugin to assess exposure and apply mitigations promptly.

Potential Impact

For European organizations, this vulnerability poses a significant risk to WordPress-based websites that utilize the UsersWP plugin. Exploitation can lead to unauthorized disclosure of sensitive user data, including personal information stored in the database, which may include names, emails, and other profile details. This can result in privacy breaches violating GDPR regulations, potentially leading to legal penalties and reputational damage. Additionally, extracted data could be used for further attacks such as phishing or identity theft. Since the vulnerability does not affect data integrity or availability directly, the primary concern is confidentiality compromise. However, the ease of exploitation without authentication increases the threat level, especially for organizations with public-facing WordPress sites relying on this plugin. The lack of known exploits in the wild suggests limited current active exploitation, but the vulnerability’s presence in a popular CMS plugin makes it a likely target for attackers once publicized.

Mitigation Recommendations

1. Immediate mitigation involves updating the UsersWP plugin to a patched version once available. Until then, consider disabling or removing the plugin if feasible. 2. Implement Web Application Firewall (WAF) rules specifically targeting SQL injection patterns related to the 'upload_file_remove' function and 'htmlvar' parameter to block malicious requests. 3. Employ input validation and sanitization at the application level, ensuring that all user inputs are properly escaped or parameterized before database queries. 4. Monitor web server and database logs for unusual query patterns or repeated access attempts to the vulnerable endpoints. 5. Restrict database user permissions to the minimum necessary to limit the impact of potential SQL injection. 6. Conduct regular security assessments and penetration testing focusing on WordPress plugins and custom code to detect similar vulnerabilities. 7. Educate site administrators about the risks of outdated plugins and the importance of timely updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-04T18:27:06.623Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bb9c18535f4a97731dab4f

Added to database: 9/6/2025, 2:27:36 AM

Last enriched: 9/6/2025, 2:43:17 AM

Last updated: 9/7/2025, 6:16:33 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats