CVE-2025-10163: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in fernandobt List category posts
The List category posts plugin for WordPress is vulnerable to time-based SQL Injection via the ‘starting_with’ parameter of the catlist shortcode in all versions up to, and including, 0.91.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-10163 affects the 'List category posts' WordPress plugin developed by fernandobt, specifically versions up to and including 0.91.0. The flaw is a time-based SQL Injection (CWE-89) occurring via the 'starting_with' parameter in the catlist shortcode. This parameter is insufficiently escaped and the SQL queries are not properly prepared, allowing an authenticated attacker with Contributor-level access or higher to append arbitrary SQL commands to existing queries. This can be exploited to extract sensitive information from the WordPress database, such as user data or site configuration details. The attack vector requires network access (remote) and low attack complexity, with no user interaction needed beyond authentication. The vulnerability impacts confidentiality but does not affect integrity or availability. No patches are currently available, and no known exploits have been reported in the wild. The CVSS v3.1 score is 6.5 (medium severity), reflecting the moderate risk posed by this vulnerability given the required privileges and the potential data exposure.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality of data stored in WordPress databases. Organizations using the 'List category posts' plugin on their WordPress sites could have sensitive information exposed if an attacker with Contributor-level access exploits the flaw. This could include personal data of customers or employees, internal content, or configuration details, potentially leading to privacy violations under GDPR. While the vulnerability does not allow data modification or service disruption, the unauthorized disclosure of sensitive data can damage reputation, lead to regulatory penalties, and facilitate further attacks. Organizations with multiple contributors or less restrictive access controls are at higher risk. Given the widespread use of WordPress in Europe, especially in sectors like media, education, and small to medium enterprises, the impact could be significant if not addressed promptly.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement immediate compensating controls. These include restricting Contributor-level access strictly to trusted users and auditing existing user privileges. Administrators should disable or remove the 'List category posts' plugin if it is not essential. For sites that must continue using the plugin, applying custom input validation to sanitize the 'starting_with' parameter is critical. Implementing Web Application Firewall (WAF) rules to detect and block SQL Injection patterns targeting this parameter can provide additional protection. Monitoring logs for suspicious query patterns or unusual database access is recommended. Once a patch is released, organizations should prioritize updating the plugin to the fixed version. Regular security assessments and user privilege reviews will help reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-10163: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in fernandobt List category posts
Description
The List category posts plugin for WordPress is vulnerable to time-based SQL Injection via the ‘starting_with’ parameter of the catlist shortcode in all versions up to, and including, 0.91.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-10163 affects the 'List category posts' WordPress plugin developed by fernandobt, specifically versions up to and including 0.91.0. The flaw is a time-based SQL Injection (CWE-89) occurring via the 'starting_with' parameter in the catlist shortcode. This parameter is insufficiently escaped and the SQL queries are not properly prepared, allowing an authenticated attacker with Contributor-level access or higher to append arbitrary SQL commands to existing queries. This can be exploited to extract sensitive information from the WordPress database, such as user data or site configuration details. The attack vector requires network access (remote) and low attack complexity, with no user interaction needed beyond authentication. The vulnerability impacts confidentiality but does not affect integrity or availability. No patches are currently available, and no known exploits have been reported in the wild. The CVSS v3.1 score is 6.5 (medium severity), reflecting the moderate risk posed by this vulnerability given the required privileges and the potential data exposure.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality of data stored in WordPress databases. Organizations using the 'List category posts' plugin on their WordPress sites could have sensitive information exposed if an attacker with Contributor-level access exploits the flaw. This could include personal data of customers or employees, internal content, or configuration details, potentially leading to privacy violations under GDPR. While the vulnerability does not allow data modification or service disruption, the unauthorized disclosure of sensitive data can damage reputation, lead to regulatory penalties, and facilitate further attacks. Organizations with multiple contributors or less restrictive access controls are at higher risk. Given the widespread use of WordPress in Europe, especially in sectors like media, education, and small to medium enterprises, the impact could be significant if not addressed promptly.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement immediate compensating controls. These include restricting Contributor-level access strictly to trusted users and auditing existing user privileges. Administrators should disable or remove the 'List category posts' plugin if it is not essential. For sites that must continue using the plugin, applying custom input validation to sanitize the 'starting_with' parameter is critical. Implementing Web Application Firewall (WAF) rules to detect and block SQL Injection patterns targeting this parameter can provide additional protection. Monitoring logs for suspicious query patterns or unusual database access is recommended. Once a patch is released, organizations should prioritize updating the plugin to the fixed version. Regular security assessments and user privilege reviews will help reduce the attack surface.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-09T13:18:09.330Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693a3ebcbbbecd30a6fa32fe
Added to database: 12/11/2025, 3:47:08 AM
Last enriched: 12/18/2025, 4:57:38 AM
Last updated: 2/7/2026, 9:33:49 AM
Views: 132
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.