CVE-2025-10575: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ivycat WP jQuery Pager
The WP jQuery Pager plugin for WordPress is vulnerable to SQL Injection via the 'ids' shortcode attribute parameter handled by the WPJqueryPaged::get_gallery_page_imgs() function in all versions up to, and including, 1.4.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
CVE-2025-10575 identifies a SQL Injection vulnerability in the WP jQuery Pager plugin for WordPress, specifically in versions up to and including 1.4.0. The vulnerability is located in the get_gallery_page_imgs() function, which processes the 'ids' shortcode attribute parameter. Due to insufficient escaping and lack of proper query preparation, authenticated users with Contributor-level access or higher can inject additional SQL commands into existing queries. This improper neutralization of special elements (CWE-89) allows attackers to extract sensitive information from the backend database. The attack vector is remote over the network, requiring only low privileges and no user interaction beyond authentication. The CVSS v3.1 base score is 6.5, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. No patches have been linked yet, and no known exploits are reported in the wild. The vulnerability poses a risk to WordPress sites using this plugin, especially those that allow contributors to add shortcode content. Exploitation could lead to unauthorized data disclosure, including potentially sensitive user or site data stored in the database. The lack of sufficient input sanitization and prepared statements in the plugin’s code is the root cause. This vulnerability underscores the importance of secure coding practices in WordPress plugin development, particularly for user-supplied input handling.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive data stored in WordPress databases, including user information, site content, and potentially credentials or configuration details if stored insecurely. Organizations relying on WP jQuery Pager for content pagination and allowing contributor-level users to add shortcode parameters are at risk. The confidentiality breach could result in reputational damage, regulatory non-compliance (e.g., GDPR violations), and potential data privacy incidents. Since the vulnerability does not affect integrity or availability, direct service disruption or data manipulation is unlikely. However, data leakage could facilitate further attacks or social engineering campaigns. The medium severity score indicates a significant but not critical risk, emphasizing the need for timely remediation. European entities with public-facing WordPress sites, especially in sectors like media, education, and government, where contributor roles are common, should be particularly vigilant.
Mitigation Recommendations
1. Immediately restrict Contributor-level and higher user roles from adding or modifying shortcode attributes until a patch is available. 2. Implement strict input validation and sanitization on all user-supplied shortcode parameters, especially the 'ids' attribute, to ensure only expected numeric or safe values are accepted. 3. Use Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the affected plugin functions. 4. Monitor database query logs for unusual or unexpected queries that may indicate exploitation attempts. 5. Encourage plugin developers or site administrators to update the plugin once a secure version is released. 6. Consider disabling or replacing the WP jQuery Pager plugin if immediate patching is not feasible. 7. Conduct regular security audits and penetration testing focusing on WordPress plugins and user input handling. 8. Educate content contributors about the risks of injecting untrusted content and enforce least privilege principles.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10575: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ivycat WP jQuery Pager
Description
The WP jQuery Pager plugin for WordPress is vulnerable to SQL Injection via the 'ids' shortcode attribute parameter handled by the WPJqueryPaged::get_gallery_page_imgs() function in all versions up to, and including, 1.4.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Technical Analysis
CVE-2025-10575 identifies a SQL Injection vulnerability in the WP jQuery Pager plugin for WordPress, specifically in versions up to and including 1.4.0. The vulnerability is located in the get_gallery_page_imgs() function, which processes the 'ids' shortcode attribute parameter. Due to insufficient escaping and lack of proper query preparation, authenticated users with Contributor-level access or higher can inject additional SQL commands into existing queries. This improper neutralization of special elements (CWE-89) allows attackers to extract sensitive information from the backend database. The attack vector is remote over the network, requiring only low privileges and no user interaction beyond authentication. The CVSS v3.1 base score is 6.5, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. No patches have been linked yet, and no known exploits are reported in the wild. The vulnerability poses a risk to WordPress sites using this plugin, especially those that allow contributors to add shortcode content. Exploitation could lead to unauthorized data disclosure, including potentially sensitive user or site data stored in the database. The lack of sufficient input sanitization and prepared statements in the plugin’s code is the root cause. This vulnerability underscores the importance of secure coding practices in WordPress plugin development, particularly for user-supplied input handling.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive data stored in WordPress databases, including user information, site content, and potentially credentials or configuration details if stored insecurely. Organizations relying on WP jQuery Pager for content pagination and allowing contributor-level users to add shortcode parameters are at risk. The confidentiality breach could result in reputational damage, regulatory non-compliance (e.g., GDPR violations), and potential data privacy incidents. Since the vulnerability does not affect integrity or availability, direct service disruption or data manipulation is unlikely. However, data leakage could facilitate further attacks or social engineering campaigns. The medium severity score indicates a significant but not critical risk, emphasizing the need for timely remediation. European entities with public-facing WordPress sites, especially in sectors like media, education, and government, where contributor roles are common, should be particularly vigilant.
Mitigation Recommendations
1. Immediately restrict Contributor-level and higher user roles from adding or modifying shortcode attributes until a patch is available. 2. Implement strict input validation and sanitization on all user-supplied shortcode parameters, especially the 'ids' attribute, to ensure only expected numeric or safe values are accepted. 3. Use Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the affected plugin functions. 4. Monitor database query logs for unusual or unexpected queries that may indicate exploitation attempts. 5. Encourage plugin developers or site administrators to update the plugin once a secure version is released. 6. Consider disabling or replacing the WP jQuery Pager plugin if immediate patching is not feasible. 7. Conduct regular security audits and penetration testing focusing on WordPress plugins and user input handling. 8. Educate content contributors about the risks of injecting untrusted content and enforce least privilege principles.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-16T18:39:03.867Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ef5c7dc4f69c9730e569cf
Added to database: 10/15/2025, 8:34:05 AM
Last enriched: 11/24/2025, 9:31:22 PM
Last updated: 12/4/2025, 12:40:30 PM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11222: na in LINE Corporation Central Dogma
Medium5 Threats That Reshaped Web Security This Year [2025]
MediumPersonal Information Compromised in Freedom Mobile Data Breach
MediumMarquis Data Breach Impacts Over 780,000 People
MediumProtecting LLM chats from the eavesdropping Whisper Leak attack | Kaspersky official blog
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.