CVE-2025-10045: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in onofficeweb onOffice for WP-Websites
CVE-2025-10045 is a medium severity SQL Injection vulnerability in the onOffice for WP-Websites WordPress plugin affecting all versions up to 5. 7. It arises from improper sanitization of the 'order' parameter, allowing authenticated users with Editor-level or higher privileges to inject additional SQL commands. This vulnerability enables attackers to extract sensitive database information without requiring user interaction. Exploitation requires network access and elevated privileges but does not impact data integrity or availability. No known exploits are currently reported in the wild. European organizations using this plugin in their WordPress environments are at risk of data exposure. Mitigation involves applying patches once available, restricting Editor-level access, and implementing strict input validation. Countries with significant WordPress usage and real estate or CRM sectors relying on onOffice are most likely affected.
AI Analysis
Technical Summary
CVE-2025-10045 is a SQL Injection vulnerability identified in the onOffice for WP-Websites plugin for WordPress, versions up to and including 5.7. The flaw stems from improper neutralization of special elements in the 'order' parameter used within SQL queries. Specifically, the plugin fails to adequately escape or prepare the user-supplied 'order' parameter, allowing an authenticated attacker with Editor-level or higher privileges to append arbitrary SQL commands to existing queries. This can lead to unauthorized extraction of sensitive information from the underlying database. The vulnerability does not require user interaction but does require authenticated access with elevated privileges, limiting the attack surface to users who already have significant access rights. The CVSS v3.1 score is 4.9 (medium), reflecting the network attack vector, low attack complexity, and high confidentiality impact but no integrity or availability impact. No public exploits are currently known, and no patches have been linked yet. The vulnerability is categorized under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). Given the plugin’s use in WordPress environments, exploitation could compromise customer data, internal business information, or other sensitive records stored in the database. The lack of sufficient input sanitization indicates a need for improved secure coding practices in the plugin’s development.
Potential Impact
For European organizations, the primary impact is unauthorized disclosure of sensitive data stored in WordPress databases using the onOffice plugin. This could include customer information, business intelligence, or proprietary data relevant to real estate or CRM operations. Since exploitation requires Editor-level access, the threat is mainly from insider threats or compromised accounts with elevated privileges. Data confidentiality is at risk, potentially leading to GDPR violations if personal data is exposed, resulting in regulatory fines and reputational damage. The integrity and availability of systems are not directly affected, reducing the risk of service disruption. However, the exposure of sensitive data could facilitate further attacks such as phishing or social engineering. Organizations relying on this plugin for critical business functions may face operational risks if data confidentiality is breached. The medium severity rating suggests that while the vulnerability is serious, it is not trivially exploitable by unauthenticated attackers, somewhat limiting its impact scope.
Mitigation Recommendations
1. Immediately restrict Editor-level and higher privileges to trusted users only, implementing strict access controls and monitoring for suspicious activity. 2. Apply patches or updates from the onOffice vendor as soon as they become available to fix the SQL injection flaw. 3. In the absence of patches, consider temporarily disabling or removing the onOffice plugin to eliminate the attack vector. 4. Implement Web Application Firewall (WAF) rules to detect and block malicious SQL injection attempts targeting the 'order' parameter. 5. Conduct regular audits of user privileges and database access logs to detect potential exploitation attempts. 6. Employ input validation and sanitization at the application level for all user-supplied parameters, especially those used in SQL queries. 7. Educate administrators and editors on the risks of privilege misuse and encourage strong password policies and multi-factor authentication to reduce account compromise risk. 8. Monitor threat intelligence feeds for any emerging exploits related to CVE-2025-10045 to respond promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Switzerland, Austria
CVE-2025-10045: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in onofficeweb onOffice for WP-Websites
Description
CVE-2025-10045 is a medium severity SQL Injection vulnerability in the onOffice for WP-Websites WordPress plugin affecting all versions up to 5. 7. It arises from improper sanitization of the 'order' parameter, allowing authenticated users with Editor-level or higher privileges to inject additional SQL commands. This vulnerability enables attackers to extract sensitive database information without requiring user interaction. Exploitation requires network access and elevated privileges but does not impact data integrity or availability. No known exploits are currently reported in the wild. European organizations using this plugin in their WordPress environments are at risk of data exposure. Mitigation involves applying patches once available, restricting Editor-level access, and implementing strict input validation. Countries with significant WordPress usage and real estate or CRM sectors relying on onOffice are most likely affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-10045 is a SQL Injection vulnerability identified in the onOffice for WP-Websites plugin for WordPress, versions up to and including 5.7. The flaw stems from improper neutralization of special elements in the 'order' parameter used within SQL queries. Specifically, the plugin fails to adequately escape or prepare the user-supplied 'order' parameter, allowing an authenticated attacker with Editor-level or higher privileges to append arbitrary SQL commands to existing queries. This can lead to unauthorized extraction of sensitive information from the underlying database. The vulnerability does not require user interaction but does require authenticated access with elevated privileges, limiting the attack surface to users who already have significant access rights. The CVSS v3.1 score is 4.9 (medium), reflecting the network attack vector, low attack complexity, and high confidentiality impact but no integrity or availability impact. No public exploits are currently known, and no patches have been linked yet. The vulnerability is categorized under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). Given the plugin’s use in WordPress environments, exploitation could compromise customer data, internal business information, or other sensitive records stored in the database. The lack of sufficient input sanitization indicates a need for improved secure coding practices in the plugin’s development.
Potential Impact
For European organizations, the primary impact is unauthorized disclosure of sensitive data stored in WordPress databases using the onOffice plugin. This could include customer information, business intelligence, or proprietary data relevant to real estate or CRM operations. Since exploitation requires Editor-level access, the threat is mainly from insider threats or compromised accounts with elevated privileges. Data confidentiality is at risk, potentially leading to GDPR violations if personal data is exposed, resulting in regulatory fines and reputational damage. The integrity and availability of systems are not directly affected, reducing the risk of service disruption. However, the exposure of sensitive data could facilitate further attacks such as phishing or social engineering. Organizations relying on this plugin for critical business functions may face operational risks if data confidentiality is breached. The medium severity rating suggests that while the vulnerability is serious, it is not trivially exploitable by unauthenticated attackers, somewhat limiting its impact scope.
Mitigation Recommendations
1. Immediately restrict Editor-level and higher privileges to trusted users only, implementing strict access controls and monitoring for suspicious activity. 2. Apply patches or updates from the onOffice vendor as soon as they become available to fix the SQL injection flaw. 3. In the absence of patches, consider temporarily disabling or removing the onOffice plugin to eliminate the attack vector. 4. Implement Web Application Firewall (WAF) rules to detect and block malicious SQL injection attempts targeting the 'order' parameter. 5. Conduct regular audits of user privileges and database access logs to detect potential exploitation attempts. 6. Employ input validation and sanitization at the application level for all user-supplied parameters, especially those used in SQL queries. 7. Educate administrators and editors on the risks of privilege misuse and encourage strong password policies and multi-factor authentication to reduce account compromise risk. 8. Monitor threat intelligence feeds for any emerging exploits related to CVE-2025-10045 to respond promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-05T18:28:17.507Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ef5c7bc4f69c9730e56938
Added to database: 10/15/2025, 8:34:03 AM
Last enriched: 12/2/2025, 2:53:02 PM
Last updated: 12/3/2025, 3:12:49 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13646: CWE-434 Unrestricted Upload of File with Dangerous Type in wpchill Image Gallery – Photo Grid & Video Gallery
HighCVE-2025-13645: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpchill Image Gallery – Photo Grid & Video Gallery
HighCVE-2025-13448: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in anastis CSSIgniter Shortcodes
MediumCVE-2025-55181: Excessive Iteration (CWE-834) in Facebook proxygen
MediumCVE-2025-64778: CWE-798 Use of Hard-coded Credentials in Mirion Medical EC2 Software NMIS BioDose
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.