Skip to main content

CVE-2025-10142: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in martins56 PagBank / PagSeguro Connect para WooCommerce

Medium
VulnerabilityCVE-2025-10142cvecve-2025-10142cwe-89
Published: Wed Sep 10 2025 (09/10/2025, 06:38:51 UTC)
Source: CVE Database V5
Vendor/Project: martins56
Product: PagBank / PagSeguro Connect para WooCommerce

Description

The PagBank / PagSeguro Connect para WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'status' parameter in all versions up to, and including, 4.44.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 09/10/2025, 07:03:33 UTC

Technical Analysis

CVE-2025-10142 is a medium-severity SQL Injection vulnerability affecting the PagBank / PagSeguro Connect para WooCommerce plugin for WordPress, maintained by martins56. This vulnerability exists in all versions up to and including 4.44.3. The root cause is improper neutralization of special elements used in SQL commands (CWE-89), specifically due to insufficient escaping of the 'status' parameter supplied by users and a lack of proper query preparation. Authenticated attackers with Shop Manager-level privileges or higher can exploit this flaw by injecting malicious SQL code into the 'status' parameter, which is concatenated into existing SQL queries without adequate sanitization or parameterization. This allows attackers to append additional SQL queries, enabling them to extract sensitive information from the backend database. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based (remote). The CVSS v3.1 base score is 4.9, reflecting a medium severity primarily due to the requirement of high privileges (Shop Manager or above) and the absence of impact on integrity or availability, but with a high impact on confidentiality. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was published on September 10, 2025, and assigned by Wordfence. The plugin is widely used in e-commerce environments that integrate PagBank / PagSeguro payment services with WooCommerce, a popular WordPress e-commerce platform.

Potential Impact

For European organizations using WooCommerce with the PagBank / PagSeguro Connect plugin, this vulnerability poses a significant risk to the confidentiality of sensitive customer and transactional data stored in the backend databases. Attackers with Shop Manager-level access can exploit the vulnerability to extract payment information, customer details, or other sensitive business data, potentially leading to data breaches and regulatory non-compliance under GDPR. Although the vulnerability does not affect data integrity or availability, the exposure of confidential data can damage brand reputation, result in financial penalties, and erode customer trust. Given the widespread adoption of WooCommerce in European small and medium enterprises (SMEs) and the increasing use of PagBank / PagSeguro payment solutions by merchants targeting Latin American and European markets, the threat is relevant. The requirement for authenticated access limits exploitation to insiders or compromised accounts, but phishing or credential theft could facilitate such access. The lack of known exploits in the wild suggests that immediate widespread attacks are unlikely, but the vulnerability remains a critical risk if left unmitigated.

Mitigation Recommendations

1. Immediate mitigation involves restricting Shop Manager and higher privileges to trusted personnel only and enforcing strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of account compromise. 2. Monitor and audit Shop Manager account activities for suspicious behavior indicative of exploitation attempts. 3. Implement Web Application Firewall (WAF) rules that detect and block SQL injection patterns targeting the 'status' parameter in HTTP requests to the WooCommerce plugin endpoints. 4. Until an official patch is released, consider temporarily disabling or removing the PagBank / PagSeguro Connect plugin if feasible, or isolating its database access with least privilege principles. 5. Review and harden database user permissions to limit the scope of data accessible by the plugin's database user account. 6. Regularly update WordPress, WooCommerce, and all plugins to their latest versions once patches addressing this vulnerability are available. 7. Conduct internal security awareness training to prevent credential theft and ensure that only authorized users have Shop Manager privileges. 8. Employ database activity monitoring solutions to detect anomalous query patterns that may indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-08T20:46:52.706Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c11e7de55cc6e90d9f3b5a

Added to database: 9/10/2025, 6:45:17 AM

Last enriched: 9/10/2025, 7:03:33 AM

Last updated: 9/10/2025, 7:52:52 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats