CVE-2025-10037: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in marceljm Featured Image from URL (FIFU)
The Featured Image from URL (FIFU) plugin for WordPress is vulnerable to SQL Injection via the get_posts_with_internal_featured_image() function in all versions up to, and including, 5.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
CVE-2025-10037 is a medium-severity SQL Injection vulnerability affecting the WordPress plugin 'Featured Image from URL (FIFU)' developed by marceljm. This vulnerability exists in all versions up to and including 5.2.7. The root cause is improper neutralization of special elements in SQL commands (CWE-89) within the get_posts_with_internal_featured_image() function. Specifically, the plugin fails to properly escape user-supplied parameters and does not adequately prepare SQL queries, allowing an attacker with authenticated Administrator-level access or higher to inject additional SQL statements. This injection can be used to extract sensitive information from the WordPress database. The vulnerability does not require user interaction but does require high privileges (administrator or above). The CVSS 3.1 base score is 4.9, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The attack vector is network-based with low attack complexity, but the prerequisite of administrator-level privileges limits the scope of potential attackers. The vulnerability is significant because WordPress is widely used across many organizations, and plugins like FIFU are popular for managing featured images via URLs, making this a relevant threat to websites relying on this plugin for content management.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites running WordPress with the FIFU plugin installed and active. An attacker who has gained administrator access—potentially through other means such as credential compromise or privilege escalation—can leverage this SQL injection to extract sensitive data from the backend database. This could include user credentials, personal data, or other confidential information stored in the WordPress database, potentially violating GDPR and other data protection regulations. Although the vulnerability does not allow direct modification or deletion of data, the confidentiality breach alone can lead to reputational damage, regulatory fines, and loss of customer trust. The requirement for administrator privileges reduces the likelihood of exploitation by external attackers without prior access, but insider threats or attackers who have already compromised admin accounts remain a concern. Given the widespread use of WordPress in Europe, especially among SMEs and public sector websites, the impact can be significant if not addressed promptly.
Mitigation Recommendations
1. Immediate mitigation involves restricting administrator access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit administrator account activities for suspicious behavior that could indicate exploitation attempts. 3. Disable or uninstall the FIFU plugin if it is not essential to the website's operation. 4. For sites requiring the plugin, apply any available updates or patches from the vendor as soon as they are released. Since no patches are currently linked, organizations should follow the plugin developer's communications closely. 5. Implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the vulnerable function. 6. Conduct regular security assessments and penetration testing focusing on plugin vulnerabilities and privilege escalation paths. 7. Backup website data regularly and securely to enable recovery in case of compromise. 8. Educate administrators on the risks of SQL injection and the importance of secure plugin management.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-10037: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in marceljm Featured Image from URL (FIFU)
Description
The Featured Image from URL (FIFU) plugin for WordPress is vulnerable to SQL Injection via the get_posts_with_internal_featured_image() function in all versions up to, and including, 5.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Technical Analysis
CVE-2025-10037 is a medium-severity SQL Injection vulnerability affecting the WordPress plugin 'Featured Image from URL (FIFU)' developed by marceljm. This vulnerability exists in all versions up to and including 5.2.7. The root cause is improper neutralization of special elements in SQL commands (CWE-89) within the get_posts_with_internal_featured_image() function. Specifically, the plugin fails to properly escape user-supplied parameters and does not adequately prepare SQL queries, allowing an attacker with authenticated Administrator-level access or higher to inject additional SQL statements. This injection can be used to extract sensitive information from the WordPress database. The vulnerability does not require user interaction but does require high privileges (administrator or above). The CVSS 3.1 base score is 4.9, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The attack vector is network-based with low attack complexity, but the prerequisite of administrator-level privileges limits the scope of potential attackers. The vulnerability is significant because WordPress is widely used across many organizations, and plugins like FIFU are popular for managing featured images via URLs, making this a relevant threat to websites relying on this plugin for content management.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites running WordPress with the FIFU plugin installed and active. An attacker who has gained administrator access—potentially through other means such as credential compromise or privilege escalation—can leverage this SQL injection to extract sensitive data from the backend database. This could include user credentials, personal data, or other confidential information stored in the WordPress database, potentially violating GDPR and other data protection regulations. Although the vulnerability does not allow direct modification or deletion of data, the confidentiality breach alone can lead to reputational damage, regulatory fines, and loss of customer trust. The requirement for administrator privileges reduces the likelihood of exploitation by external attackers without prior access, but insider threats or attackers who have already compromised admin accounts remain a concern. Given the widespread use of WordPress in Europe, especially among SMEs and public sector websites, the impact can be significant if not addressed promptly.
Mitigation Recommendations
1. Immediate mitigation involves restricting administrator access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit administrator account activities for suspicious behavior that could indicate exploitation attempts. 3. Disable or uninstall the FIFU plugin if it is not essential to the website's operation. 4. For sites requiring the plugin, apply any available updates or patches from the vendor as soon as they are released. Since no patches are currently linked, organizations should follow the plugin developer's communications closely. 5. Implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the vulnerable function. 6. Conduct regular security assessments and penetration testing focusing on plugin vulnerabilities and privilege escalation paths. 7. Backup website data regularly and securely to enable recovery in case of compromise. 8. Educate administrators on the risks of SQL injection and the importance of secure plugin management.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-05T17:13:27.772Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d6187890922828e6e3b94e
Added to database: 9/26/2025, 4:37:12 AM
Last enriched: 9/26/2025, 4:38:03 AM
Last updated: 9/26/2025, 5:35:02 AM
Views: 3
Related Threats
CVE-2025-9490: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in danieliser Popup Maker – Boost Sales, Conversions, Optins, Subscribers with the Ultimate WP Popups Builder
MediumCVE-2025-10747: CWE-434 Unrestricted Upload of File with Dangerous Type in gamerz WP-DownloadManager
HighCVE-2025-9985: CWE-532 Insertion of Sensitive Information into Log File in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-9984: CWE-862 Missing Authorization in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-10036: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in marceljm Featured Image from URL (FIFU)
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.