CVE-2025-10289: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wssoffice21 Filter & Grids
The Filter & Grids plugin for WordPress is vulnerable to SQL Injection via the 'phrase' parameter in all versions up to, and including, 3.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This only works on MariaDB as the query results in a syntax error on MySQL.
AI Analysis
Technical Summary
CVE-2025-10289 identifies a SQL Injection vulnerability in the Filter & Grids plugin for WordPress, developed by wssoffice21, affecting all versions up to 3.2.0. The vulnerability stems from improper neutralization of special elements in the 'phrase' parameter, which is directly incorporated into SQL queries without sufficient escaping or parameterization. This allows unauthenticated attackers to append arbitrary SQL commands to existing queries, enabling extraction of sensitive data from the underlying database. The issue specifically affects MariaDB databases because the crafted injection payloads cause syntax errors on MySQL, preventing exploitation on that platform. The vulnerability does not require user authentication or interaction but has a high attack complexity due to the need to craft precise injection payloads. The CVSS 3.1 score is 5.9 (medium severity), reflecting the high confidentiality impact but no impact on integrity or availability. No public exploits have been reported to date. The vulnerability is categorized under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). Since the plugin is widely used in WordPress environments, especially those leveraging MariaDB, this vulnerability poses a significant risk of data leakage if exploited. The lack of patches at the time of reporting necessitates immediate mitigation through compensating controls.
Potential Impact
For European organizations, the primary impact is unauthorized disclosure of sensitive information stored in WordPress databases using the Filter & Grids plugin with MariaDB backends. This could include user data, configuration details, or other confidential content, potentially leading to privacy violations under GDPR and reputational damage. The vulnerability does not allow modification or deletion of data, nor does it cause denial of service, limiting the scope to confidentiality breaches. Organizations with public-facing WordPress sites are particularly vulnerable as the exploit requires no authentication. The medium severity rating suggests a moderate risk, but the potential regulatory and compliance consequences in Europe elevate the importance of addressing this issue promptly. Attackers could leverage this vulnerability to gather intelligence for further attacks or social engineering campaigns. The lack of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation.
Mitigation Recommendations
1. Monitor wssoffice21 and WordPress plugin repositories for official patches and apply them immediately upon release. 2. Until patches are available, restrict database user permissions to the minimum necessary, avoiding excessive read privileges that could be exploited. 3. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'phrase' parameter. 4. Conduct code reviews or audits of the Filter & Grids plugin usage to identify and isolate vulnerable endpoints. 5. Employ database activity monitoring to detect anomalous query patterns indicative of injection attempts. 6. Consider migrating from MariaDB to MySQL if feasible, as the vulnerability does not exploit MySQL due to syntax errors. 7. Educate development and security teams about the risks of SQL injection and the importance of parameterized queries and input validation. 8. Regularly back up WordPress databases and configurations to enable recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-10289: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wssoffice21 Filter & Grids
Description
The Filter & Grids plugin for WordPress is vulnerable to SQL Injection via the 'phrase' parameter in all versions up to, and including, 3.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This only works on MariaDB as the query results in a syntax error on MySQL.
AI-Powered Analysis
Technical Analysis
CVE-2025-10289 identifies a SQL Injection vulnerability in the Filter & Grids plugin for WordPress, developed by wssoffice21, affecting all versions up to 3.2.0. The vulnerability stems from improper neutralization of special elements in the 'phrase' parameter, which is directly incorporated into SQL queries without sufficient escaping or parameterization. This allows unauthenticated attackers to append arbitrary SQL commands to existing queries, enabling extraction of sensitive data from the underlying database. The issue specifically affects MariaDB databases because the crafted injection payloads cause syntax errors on MySQL, preventing exploitation on that platform. The vulnerability does not require user authentication or interaction but has a high attack complexity due to the need to craft precise injection payloads. The CVSS 3.1 score is 5.9 (medium severity), reflecting the high confidentiality impact but no impact on integrity or availability. No public exploits have been reported to date. The vulnerability is categorized under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). Since the plugin is widely used in WordPress environments, especially those leveraging MariaDB, this vulnerability poses a significant risk of data leakage if exploited. The lack of patches at the time of reporting necessitates immediate mitigation through compensating controls.
Potential Impact
For European organizations, the primary impact is unauthorized disclosure of sensitive information stored in WordPress databases using the Filter & Grids plugin with MariaDB backends. This could include user data, configuration details, or other confidential content, potentially leading to privacy violations under GDPR and reputational damage. The vulnerability does not allow modification or deletion of data, nor does it cause denial of service, limiting the scope to confidentiality breaches. Organizations with public-facing WordPress sites are particularly vulnerable as the exploit requires no authentication. The medium severity rating suggests a moderate risk, but the potential regulatory and compliance consequences in Europe elevate the importance of addressing this issue promptly. Attackers could leverage this vulnerability to gather intelligence for further attacks or social engineering campaigns. The lack of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation.
Mitigation Recommendations
1. Monitor wssoffice21 and WordPress plugin repositories for official patches and apply them immediately upon release. 2. Until patches are available, restrict database user permissions to the minimum necessary, avoiding excessive read privileges that could be exploited. 3. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'phrase' parameter. 4. Conduct code reviews or audits of the Filter & Grids plugin usage to identify and isolate vulnerable endpoints. 5. Employ database activity monitoring to detect anomalous query patterns indicative of injection attempts. 6. Consider migrating from MariaDB to MySQL if feasible, as the vulnerability does not exploit MySQL due to syntax errors. 7. Educate development and security teams about the risks of SQL injection and the importance of parameterized queries and input validation. 8. Regularly back up WordPress databases and configurations to enable recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-11T17:23:05.411Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693d169bdd056aa40b71808d
Added to database: 12/13/2025, 7:32:43 AM
Last enriched: 12/13/2025, 7:47:53 AM
Last updated: 12/15/2025, 4:27:52 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14703: Improper Authentication in Shiguangwu sgwbox N3
MediumCVE-2025-14698: Path Traversal in atlaszz AI Photo Team Galleryit App
MediumCVE-2025-14697: Files or Directories Accessible in Shenzhen Sixun Software Sixun Shanghui Group Business Management System
MediumCVE-2025-67907
UnknownCVE-2025-14702: Path Traversal in Smartbit CommV Smartschool App
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.