CVE-2025-10175: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in rico-macchi WP Links Page
The WP Links Page plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 4.9.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
CVE-2025-10175 is a SQL Injection vulnerability classified under CWE-89 that affects the WP Links Page plugin for WordPress, versions up to and including 4.9.6. The vulnerability arises from improper neutralization of special elements in the 'id' parameter used within SQL commands. Specifically, the plugin fails to properly escape user-supplied input and does not use prepared statements or parameterized queries, allowing an authenticated attacker with Subscriber-level access or higher to inject additional SQL commands. This injection can be appended to existing queries, enabling the attacker to extract sensitive information from the underlying database. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS 3.1 base score is 6.5 (medium severity), reflecting the high confidentiality impact but no impact on integrity or availability. The attack complexity is low, and privileges required are low (authenticated Subscriber). No known exploits have been reported in the wild as of the publication date. The vulnerability highlights the risks of insufficient input validation and the importance of using prepared statements in WordPress plugin development. Organizations using this plugin should be aware of the risk of data leakage and take immediate steps to mitigate it.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential unauthorized disclosure of sensitive data stored in WordPress databases, including user information, configuration details, and potentially other confidential content. Since the vulnerability requires only Subscriber-level authentication, it lowers the barrier for exploitation, especially on sites with open registration or weak access controls. Data breaches resulting from this vulnerability could lead to regulatory non-compliance under GDPR, reputational damage, and financial penalties. The lack of impact on integrity and availability means attackers cannot modify or disrupt data but can silently exfiltrate it, making detection more difficult. Organizations relying on the WP Links Page plugin for critical or customer-facing websites are at risk of targeted attacks aiming to harvest user data or internal information. This risk is amplified in sectors with high data sensitivity such as finance, healthcare, and government. Additionally, the widespread use of WordPress in Europe, particularly in countries with large digital economies, increases the potential attack surface.
Mitigation Recommendations
1. Immediately audit all WordPress sites for the presence of the WP Links Page plugin and identify versions up to 4.9.6. 2. Apply vendor patches or updates as soon as they become available; if no patch exists yet, consider temporarily disabling or removing the plugin. 3. Restrict Subscriber-level privileges to trusted users only and review user registration policies to limit unauthorized account creation. 4. Implement Web Application Firewalls (WAF) with SQL Injection detection and prevention rules tailored to WordPress environments to block malicious payloads targeting the 'id' parameter. 5. Enable detailed logging and monitoring of database queries and access patterns to detect anomalous activity indicative of SQL Injection attempts. 6. Employ database user accounts with least privilege, ensuring WordPress database users cannot perform unauthorized queries or access unrelated data. 7. Educate site administrators on secure plugin management and the risks of outdated or vulnerable plugins. 8. Consider using security plugins that perform input sanitization and vulnerability scanning to identify similar issues proactively.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10175: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in rico-macchi WP Links Page
Description
The WP Links Page plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 4.9.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Technical Analysis
CVE-2025-10175 is a SQL Injection vulnerability classified under CWE-89 that affects the WP Links Page plugin for WordPress, versions up to and including 4.9.6. The vulnerability arises from improper neutralization of special elements in the 'id' parameter used within SQL commands. Specifically, the plugin fails to properly escape user-supplied input and does not use prepared statements or parameterized queries, allowing an authenticated attacker with Subscriber-level access or higher to inject additional SQL commands. This injection can be appended to existing queries, enabling the attacker to extract sensitive information from the underlying database. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS 3.1 base score is 6.5 (medium severity), reflecting the high confidentiality impact but no impact on integrity or availability. The attack complexity is low, and privileges required are low (authenticated Subscriber). No known exploits have been reported in the wild as of the publication date. The vulnerability highlights the risks of insufficient input validation and the importance of using prepared statements in WordPress plugin development. Organizations using this plugin should be aware of the risk of data leakage and take immediate steps to mitigate it.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential unauthorized disclosure of sensitive data stored in WordPress databases, including user information, configuration details, and potentially other confidential content. Since the vulnerability requires only Subscriber-level authentication, it lowers the barrier for exploitation, especially on sites with open registration or weak access controls. Data breaches resulting from this vulnerability could lead to regulatory non-compliance under GDPR, reputational damage, and financial penalties. The lack of impact on integrity and availability means attackers cannot modify or disrupt data but can silently exfiltrate it, making detection more difficult. Organizations relying on the WP Links Page plugin for critical or customer-facing websites are at risk of targeted attacks aiming to harvest user data or internal information. This risk is amplified in sectors with high data sensitivity such as finance, healthcare, and government. Additionally, the widespread use of WordPress in Europe, particularly in countries with large digital economies, increases the potential attack surface.
Mitigation Recommendations
1. Immediately audit all WordPress sites for the presence of the WP Links Page plugin and identify versions up to 4.9.6. 2. Apply vendor patches or updates as soon as they become available; if no patch exists yet, consider temporarily disabling or removing the plugin. 3. Restrict Subscriber-level privileges to trusted users only and review user registration policies to limit unauthorized account creation. 4. Implement Web Application Firewalls (WAF) with SQL Injection detection and prevention rules tailored to WordPress environments to block malicious payloads targeting the 'id' parameter. 5. Enable detailed logging and monitoring of database queries and access patterns to detect anomalous activity indicative of SQL Injection attempts. 6. Employ database user accounts with least privilege, ensuring WordPress database users cannot perform unauthorized queries or access unrelated data. 7. Educate site administrators on secure plugin management and the risks of outdated or vulnerable plugins. 8. Consider using security plugins that perform input sanitization and vulnerability scanning to identify similar issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-09T14:22:12.741Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ea263d5baaa01f1ca0ff87
Added to database: 10/11/2025, 9:41:17 AM
Last enriched: 10/19/2025, 12:50:25 AM
Last updated: 12/1/2025, 5:19:45 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13808: Improper Authorization in orionsec orion-ops
MediumCVE-2025-13807: Improper Authorization in orionsec orion-ops
MediumCVE-2025-13806: Improper Authorization in nutzam NutzBoot
MediumCVE-2025-13800: Command Injection in ADSLR NBR1005GPEV2
MediumCVE-2025-13805: Deserialization in nutzam NutzBoot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.