CVE-2025-10047: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pmbaldha Email Tracker – Email Log, Email Open Tracking, Email Analytics & Email Management for WordPress Emails
The Email Tracker – Email Log, Email Open Tracking, Email Analytics & Email Management for WordPress Emails plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 5.3.12 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
CVE-2025-10047 identifies an SQL Injection vulnerability in the 'Email Tracker – Email Log, Email Open Tracking, Email Analytics & Email Management for WordPress Emails' plugin developed by pmbaldha. This vulnerability affects all versions up to and including 5.3.12. The root cause is improper neutralization of special elements in the 'orderby' parameter used in SQL queries. Specifically, the plugin fails to properly escape or prepare the user-supplied 'orderby' parameter before incorporating it into SQL statements. This allows an authenticated attacker with administrator privileges to append malicious SQL code to existing queries. The consequence is the potential unauthorized extraction of sensitive data from the WordPress database, such as user information, email logs, or other confidential content stored therein. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS v3.1 score is 4.9 (medium), reflecting the need for high privileges but ease of exploitation once those privileges are obtained. No patches or known exploits are currently available, but the vulnerability has been publicly disclosed and assigned a CVE identifier. The issue falls under CWE-89, which covers SQL Injection flaws due to improper input validation and sanitization.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality of sensitive data stored within WordPress databases using the affected plugin. Attackers with administrator access could leverage this flaw to extract email logs, user data, or analytics information, potentially leading to data breaches and privacy violations under GDPR. Although the vulnerability does not directly impact data integrity or availability, the exposure of confidential information could damage organizational reputation and result in regulatory penalties. Organizations relying on WordPress for email management and analytics are particularly vulnerable. Since exploitation requires administrator privileges, the threat is heightened if administrator accounts are compromised through phishing or credential theft. The lack of known exploits reduces immediate risk, but the public disclosure increases the likelihood of future attacks. European entities with large WordPress deployments and sensitive email data are at greater risk, especially if patching is delayed or access controls are weak.
Mitigation Recommendations
1. Monitor for and apply plugin updates from pmbaldha promptly once a patch addressing CVE-2025-10047 is released. 2. Until a patch is available, restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 3. Conduct regular audits of administrator accounts to detect unauthorized access or privilege escalation. 4. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'orderby' parameter. 5. Review and harden database permissions to limit the scope of data accessible by WordPress and its plugins. 6. Enable detailed logging and monitoring of database queries and WordPress plugin activity to identify anomalous behavior indicative of exploitation attempts. 7. Educate administrators on phishing and credential security to reduce the risk of account compromise. 8. Consider isolating WordPress instances handling sensitive email data within segmented network zones to limit lateral movement if compromised.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-10047: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pmbaldha Email Tracker – Email Log, Email Open Tracking, Email Analytics & Email Management for WordPress Emails
Description
The Email Tracker – Email Log, Email Open Tracking, Email Analytics & Email Management for WordPress Emails plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 5.3.12 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Technical Analysis
CVE-2025-10047 identifies an SQL Injection vulnerability in the 'Email Tracker – Email Log, Email Open Tracking, Email Analytics & Email Management for WordPress Emails' plugin developed by pmbaldha. This vulnerability affects all versions up to and including 5.3.12. The root cause is improper neutralization of special elements in the 'orderby' parameter used in SQL queries. Specifically, the plugin fails to properly escape or prepare the user-supplied 'orderby' parameter before incorporating it into SQL statements. This allows an authenticated attacker with administrator privileges to append malicious SQL code to existing queries. The consequence is the potential unauthorized extraction of sensitive data from the WordPress database, such as user information, email logs, or other confidential content stored therein. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS v3.1 score is 4.9 (medium), reflecting the need for high privileges but ease of exploitation once those privileges are obtained. No patches or known exploits are currently available, but the vulnerability has been publicly disclosed and assigned a CVE identifier. The issue falls under CWE-89, which covers SQL Injection flaws due to improper input validation and sanitization.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality of sensitive data stored within WordPress databases using the affected plugin. Attackers with administrator access could leverage this flaw to extract email logs, user data, or analytics information, potentially leading to data breaches and privacy violations under GDPR. Although the vulnerability does not directly impact data integrity or availability, the exposure of confidential information could damage organizational reputation and result in regulatory penalties. Organizations relying on WordPress for email management and analytics are particularly vulnerable. Since exploitation requires administrator privileges, the threat is heightened if administrator accounts are compromised through phishing or credential theft. The lack of known exploits reduces immediate risk, but the public disclosure increases the likelihood of future attacks. European entities with large WordPress deployments and sensitive email data are at greater risk, especially if patching is delayed or access controls are weak.
Mitigation Recommendations
1. Monitor for and apply plugin updates from pmbaldha promptly once a patch addressing CVE-2025-10047 is released. 2. Until a patch is available, restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 3. Conduct regular audits of administrator accounts to detect unauthorized access or privilege escalation. 4. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'orderby' parameter. 5. Review and harden database permissions to limit the scope of data accessible by WordPress and its plugins. 6. Enable detailed logging and monitoring of database queries and WordPress plugin activity to identify anomalous behavior indicative of exploitation attempts. 7. Educate administrators on phishing and credential security to reduce the risk of account compromise. 8. Consider isolating WordPress instances handling sensitive email data within segmented network zones to limit lateral movement if compromised.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-05T18:41:12.227Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f897afd59611fbd96978c9
Added to database: 10/22/2025, 8:37:03 AM
Last enriched: 10/29/2025, 9:01:34 AM
Last updated: 12/14/2025, 10:24:52 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14654: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-14653: SQL Injection in itsourcecode Student Management System
MediumCVE-2025-14652: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14651: Use of Hard-coded Cryptographic Key in MartialBE one-hub
MediumCVE-2025-14650: SQL Injection in itsourcecode Online Cake Ordering System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.