CVE-2025-10289: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wssoffice21 Filter & Grids
The Filter & Grids plugin for WordPress is vulnerable to SQL Injection via the 'phrase' parameter in all versions up to, and including, 3.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This only works on MariaDB as the query results in a syntax error on MySQL.
AI Analysis
Technical Summary
CVE-2025-10289 is a SQL Injection vulnerability classified under CWE-89, affecting the Filter & Grids plugin for WordPress developed by wssoffice21. The vulnerability exists due to insufficient escaping and lack of proper query preparation on the 'phrase' parameter, which is user-supplied. This flaw allows an unauthenticated attacker to append arbitrary SQL commands to existing queries, potentially extracting sensitive information from the database. The vulnerability is unique in that it only successfully exploits MariaDB databases; attempts on MySQL result in syntax errors, limiting the scope of exploitation. The attack vector is remote and does not require authentication or user interaction, but the attack complexity is high due to the need for precise query crafting. The CVSS v3.1 base score is 5.9, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and documented. The plugin is widely used in WordPress environments, which are prevalent in many European organizations, especially those relying on MariaDB as their database backend. This vulnerability could be leveraged to extract sensitive data such as user credentials, personal information, or business-critical data from affected databases. The absence of integrity and availability impacts means the threat primarily concerns data confidentiality breaches rather than service disruption or data manipulation.
Potential Impact
For European organizations, the primary impact of CVE-2025-10289 is the potential unauthorized disclosure of sensitive data stored in MariaDB databases behind WordPress sites using the Filter & Grids plugin. This could include personal data protected under GDPR, intellectual property, or business-critical information. Such data breaches can lead to regulatory penalties, reputational damage, and financial losses. Since the vulnerability does not affect MySQL, organizations using MySQL are less at risk, but those with MariaDB installations must be vigilant. The unauthenticated nature of the exploit increases risk, as attackers do not need credentials or insider access. The medium severity indicates that while the threat is serious, it is not likely to cause immediate widespread disruption or data destruction. However, targeted attacks against high-value European entities, such as government, finance, or healthcare sectors, could leverage this vulnerability to gain sensitive insights. The lack of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation. Organizations with public-facing WordPress sites and MariaDB backends are the most vulnerable, especially if they have not implemented strict input validation or query parameterization.
Mitigation Recommendations
1. Monitor wssoffice21 and WordPress plugin repositories for official patches addressing CVE-2025-10289 and apply them promptly once released. 2. Until patches are available, implement Web Application Firewall (WAF) rules specifically targeting suspicious SQL injection patterns on the 'phrase' parameter to block exploit attempts. 3. Conduct a thorough audit of all WordPress plugins and remove or disable the Filter & Grids plugin if it is not essential. 4. For organizations relying on MariaDB, enforce strict input validation and sanitization on all user-supplied parameters, especially those passed to SQL queries. 5. Modify database queries to use prepared statements with parameterized queries to prevent injection. 6. Regularly review database logs for anomalous query patterns indicative of injection attempts. 7. Employ network segmentation to limit exposure of WordPress servers and MariaDB databases to the internet. 8. Educate development and operations teams on secure coding practices related to SQL query construction. 9. Consider deploying runtime application self-protection (RASP) tools that can detect and block injection attacks in real time. 10. Backup databases regularly and ensure backups are secure to enable recovery in case of data compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10289: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wssoffice21 Filter & Grids
Description
The Filter & Grids plugin for WordPress is vulnerable to SQL Injection via the 'phrase' parameter in all versions up to, and including, 3.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This only works on MariaDB as the query results in a syntax error on MySQL.
AI-Powered Analysis
Technical Analysis
CVE-2025-10289 is a SQL Injection vulnerability classified under CWE-89, affecting the Filter & Grids plugin for WordPress developed by wssoffice21. The vulnerability exists due to insufficient escaping and lack of proper query preparation on the 'phrase' parameter, which is user-supplied. This flaw allows an unauthenticated attacker to append arbitrary SQL commands to existing queries, potentially extracting sensitive information from the database. The vulnerability is unique in that it only successfully exploits MariaDB databases; attempts on MySQL result in syntax errors, limiting the scope of exploitation. The attack vector is remote and does not require authentication or user interaction, but the attack complexity is high due to the need for precise query crafting. The CVSS v3.1 base score is 5.9, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and documented. The plugin is widely used in WordPress environments, which are prevalent in many European organizations, especially those relying on MariaDB as their database backend. This vulnerability could be leveraged to extract sensitive data such as user credentials, personal information, or business-critical data from affected databases. The absence of integrity and availability impacts means the threat primarily concerns data confidentiality breaches rather than service disruption or data manipulation.
Potential Impact
For European organizations, the primary impact of CVE-2025-10289 is the potential unauthorized disclosure of sensitive data stored in MariaDB databases behind WordPress sites using the Filter & Grids plugin. This could include personal data protected under GDPR, intellectual property, or business-critical information. Such data breaches can lead to regulatory penalties, reputational damage, and financial losses. Since the vulnerability does not affect MySQL, organizations using MySQL are less at risk, but those with MariaDB installations must be vigilant. The unauthenticated nature of the exploit increases risk, as attackers do not need credentials or insider access. The medium severity indicates that while the threat is serious, it is not likely to cause immediate widespread disruption or data destruction. However, targeted attacks against high-value European entities, such as government, finance, or healthcare sectors, could leverage this vulnerability to gain sensitive insights. The lack of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation. Organizations with public-facing WordPress sites and MariaDB backends are the most vulnerable, especially if they have not implemented strict input validation or query parameterization.
Mitigation Recommendations
1. Monitor wssoffice21 and WordPress plugin repositories for official patches addressing CVE-2025-10289 and apply them promptly once released. 2. Until patches are available, implement Web Application Firewall (WAF) rules specifically targeting suspicious SQL injection patterns on the 'phrase' parameter to block exploit attempts. 3. Conduct a thorough audit of all WordPress plugins and remove or disable the Filter & Grids plugin if it is not essential. 4. For organizations relying on MariaDB, enforce strict input validation and sanitization on all user-supplied parameters, especially those passed to SQL queries. 5. Modify database queries to use prepared statements with parameterized queries to prevent injection. 6. Regularly review database logs for anomalous query patterns indicative of injection attempts. 7. Employ network segmentation to limit exposure of WordPress servers and MariaDB databases to the internet. 8. Educate development and operations teams on secure coding practices related to SQL query construction. 9. Consider deploying runtime application self-protection (RASP) tools that can detect and block injection attacks in real time. 10. Backup databases regularly and ensure backups are secure to enable recovery in case of data compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-11T17:23:05.411Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693d169bdd056aa40b71808d
Added to database: 12/13/2025, 7:32:43 AM
Last enriched: 12/20/2025, 9:09:40 AM
Last updated: 2/8/2026, 1:07:50 AM
Views: 88
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2115: SQL Injection in itsourcecode Society Management System
MediumCVE-2026-2114: SQL Injection in itsourcecode Society Management System
MediumCVE-2026-25858: CWE-640 Weak Password Recovery Mechanism for Forgotten Password in macrozheng mall
CriticalCVE-2026-25857: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Tenda Technology Tenda G300-F
HighCVE-2025-15564: Divide By Zero in Mapnik
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.