CVE-2025-10163: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in fernandobt List category posts
The List category posts plugin for WordPress is vulnerable to time-based SQL Injection via the ‘starting_with’ parameter of the catlist shortcode in all versions up to, and including, 0.91.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
CVE-2025-10163 is a time-based SQL Injection vulnerability identified in the 'List category posts' WordPress plugin developed by fernandobt. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89) due to insufficient escaping and lack of prepared statements in handling the 'starting_with' parameter of the catlist shortcode. Authenticated users with Contributor-level permissions or higher can exploit this flaw by injecting additional SQL queries appended to existing ones, enabling them to extract sensitive information from the WordPress database. The attack vector is network-based with no user interaction required, and the vulnerability does not affect data integrity or availability but compromises confidentiality. The plugin versions up to and including 0.91.0 are affected, with no patch currently available. Although no known exploits have been reported in the wild, the vulnerability presents a significant risk due to the ease of exploitation and the potential exposure of sensitive data such as user credentials, site configuration, or other stored information. The CVSS v3.1 base score is 6.5, indicating medium severity, with attack vector Network (AV:N), low attack complexity (AC:L), privileges required Low (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N).
Potential Impact
The primary impact of CVE-2025-10163 is unauthorized disclosure of sensitive information stored in the WordPress database, which could include user data, site configuration, or other confidential content. Since the vulnerability allows SQL Injection by authenticated users with Contributor-level access, attackers who have gained limited access to the site can escalate their capabilities to extract data beyond their privileges. This can lead to privacy violations, data breaches, and potential further exploitation if sensitive credentials or tokens are exposed. Although the vulnerability does not affect data integrity or availability, the confidentiality breach can undermine trust in the affected websites and lead to regulatory compliance issues, especially in regions with strict data protection laws. Organizations using the vulnerable plugin face risks of targeted attacks, especially if their WordPress installations are publicly accessible and have multiple contributors. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could be developed and weaponized.
Mitigation Recommendations
To mitigate CVE-2025-10163, organizations should immediately audit their WordPress installations for the presence of the 'List category posts' plugin and verify the version in use. Since no official patch is currently available, administrators should consider the following specific actions: 1) Temporarily disable or remove the vulnerable plugin until a patched version is released. 2) Restrict Contributor-level and higher user permissions to trusted individuals only, minimizing the risk of insider exploitation. 3) Implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'starting_with' parameter in HTTP requests. 4) Monitor database query logs and web server logs for anomalous query patterns or unusual access attempts related to the catlist shortcode. 5) Encourage plugin developers or community to release an update that properly sanitizes inputs using parameterized queries or prepared statements. 6) Educate site administrators and contributors about the risks of SQL injection and the importance of least privilege principles. 7) Regularly back up WordPress databases to enable recovery in case of compromise. These targeted mitigations go beyond generic advice by focusing on access control, monitoring, and temporary plugin management.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2025-10163: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in fernandobt List category posts
Description
The List category posts plugin for WordPress is vulnerable to time-based SQL Injection via the ‘starting_with’ parameter of the catlist shortcode in all versions up to, and including, 0.91.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-10163 is a time-based SQL Injection vulnerability identified in the 'List category posts' WordPress plugin developed by fernandobt. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89) due to insufficient escaping and lack of prepared statements in handling the 'starting_with' parameter of the catlist shortcode. Authenticated users with Contributor-level permissions or higher can exploit this flaw by injecting additional SQL queries appended to existing ones, enabling them to extract sensitive information from the WordPress database. The attack vector is network-based with no user interaction required, and the vulnerability does not affect data integrity or availability but compromises confidentiality. The plugin versions up to and including 0.91.0 are affected, with no patch currently available. Although no known exploits have been reported in the wild, the vulnerability presents a significant risk due to the ease of exploitation and the potential exposure of sensitive data such as user credentials, site configuration, or other stored information. The CVSS v3.1 base score is 6.5, indicating medium severity, with attack vector Network (AV:N), low attack complexity (AC:L), privileges required Low (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N).
Potential Impact
The primary impact of CVE-2025-10163 is unauthorized disclosure of sensitive information stored in the WordPress database, which could include user data, site configuration, or other confidential content. Since the vulnerability allows SQL Injection by authenticated users with Contributor-level access, attackers who have gained limited access to the site can escalate their capabilities to extract data beyond their privileges. This can lead to privacy violations, data breaches, and potential further exploitation if sensitive credentials or tokens are exposed. Although the vulnerability does not affect data integrity or availability, the confidentiality breach can undermine trust in the affected websites and lead to regulatory compliance issues, especially in regions with strict data protection laws. Organizations using the vulnerable plugin face risks of targeted attacks, especially if their WordPress installations are publicly accessible and have multiple contributors. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could be developed and weaponized.
Mitigation Recommendations
To mitigate CVE-2025-10163, organizations should immediately audit their WordPress installations for the presence of the 'List category posts' plugin and verify the version in use. Since no official patch is currently available, administrators should consider the following specific actions: 1) Temporarily disable or remove the vulnerable plugin until a patched version is released. 2) Restrict Contributor-level and higher user permissions to trusted individuals only, minimizing the risk of insider exploitation. 3) Implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'starting_with' parameter in HTTP requests. 4) Monitor database query logs and web server logs for anomalous query patterns or unusual access attempts related to the catlist shortcode. 5) Encourage plugin developers or community to release an update that properly sanitizes inputs using parameterized queries or prepared statements. 6) Educate site administrators and contributors about the risks of SQL injection and the importance of least privilege principles. 7) Regularly back up WordPress databases to enable recovery in case of compromise. These targeted mitigations go beyond generic advice by focusing on access control, monitoring, and temporary plugin management.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-09T13:18:09.330Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693a3ebcbbbecd30a6fa32fe
Added to database: 12/11/2025, 3:47:08 AM
Last enriched: 2/27/2026, 6:11:39 PM
Last updated: 3/24/2026, 12:46:08 AM
Views: 171
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.