Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10289: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wssoffice21 Filter & Grids

0
Medium
VulnerabilityCVE-2025-10289cvecve-2025-10289cwe-89
Published: Sat Dec 13 2025 (12/13/2025, 07:21:05 UTC)
Source: CVE Database V5
Vendor/Project: wssoffice21
Product: Filter & Grids

Description

The Filter & Grids plugin for WordPress is vulnerable to SQL Injection via the 'phrase' parameter in all versions up to, and including, 3.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This only works on MariaDB as the query results in a syntax error on MySQL.

AI-Powered Analysis

AILast updated: 12/20/2025, 09:09:40 UTC

Technical Analysis

CVE-2025-10289 is a SQL Injection vulnerability classified under CWE-89, affecting the Filter & Grids plugin for WordPress developed by wssoffice21. The vulnerability exists due to insufficient escaping and lack of proper query preparation on the 'phrase' parameter, which is user-supplied. This flaw allows an unauthenticated attacker to append arbitrary SQL commands to existing queries, potentially extracting sensitive information from the database. The vulnerability is unique in that it only successfully exploits MariaDB databases; attempts on MySQL result in syntax errors, limiting the scope of exploitation. The attack vector is remote and does not require authentication or user interaction, but the attack complexity is high due to the need for precise query crafting. The CVSS v3.1 base score is 5.9, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and documented. The plugin is widely used in WordPress environments, which are prevalent in many European organizations, especially those relying on MariaDB as their database backend. This vulnerability could be leveraged to extract sensitive data such as user credentials, personal information, or business-critical data from affected databases. The absence of integrity and availability impacts means the threat primarily concerns data confidentiality breaches rather than service disruption or data manipulation.

Potential Impact

For European organizations, the primary impact of CVE-2025-10289 is the potential unauthorized disclosure of sensitive data stored in MariaDB databases behind WordPress sites using the Filter & Grids plugin. This could include personal data protected under GDPR, intellectual property, or business-critical information. Such data breaches can lead to regulatory penalties, reputational damage, and financial losses. Since the vulnerability does not affect MySQL, organizations using MySQL are less at risk, but those with MariaDB installations must be vigilant. The unauthenticated nature of the exploit increases risk, as attackers do not need credentials or insider access. The medium severity indicates that while the threat is serious, it is not likely to cause immediate widespread disruption or data destruction. However, targeted attacks against high-value European entities, such as government, finance, or healthcare sectors, could leverage this vulnerability to gain sensitive insights. The lack of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation. Organizations with public-facing WordPress sites and MariaDB backends are the most vulnerable, especially if they have not implemented strict input validation or query parameterization.

Mitigation Recommendations

1. Monitor wssoffice21 and WordPress plugin repositories for official patches addressing CVE-2025-10289 and apply them promptly once released. 2. Until patches are available, implement Web Application Firewall (WAF) rules specifically targeting suspicious SQL injection patterns on the 'phrase' parameter to block exploit attempts. 3. Conduct a thorough audit of all WordPress plugins and remove or disable the Filter & Grids plugin if it is not essential. 4. For organizations relying on MariaDB, enforce strict input validation and sanitization on all user-supplied parameters, especially those passed to SQL queries. 5. Modify database queries to use prepared statements with parameterized queries to prevent injection. 6. Regularly review database logs for anomalous query patterns indicative of injection attempts. 7. Employ network segmentation to limit exposure of WordPress servers and MariaDB databases to the internet. 8. Educate development and operations teams on secure coding practices related to SQL query construction. 9. Consider deploying runtime application self-protection (RASP) tools that can detect and block injection attacks in real time. 10. Backup databases regularly and ensure backups are secure to enable recovery in case of data compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-09-11T17:23:05.411Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693d169bdd056aa40b71808d

Added to database: 12/13/2025, 7:32:43 AM

Last enriched: 12/20/2025, 9:09:40 AM

Last updated: 2/8/2026, 1:07:50 AM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats