Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10635: CWE-89 SQL Injection in Find Me On

0
High
VulnerabilityCVE-2025-10635cvecve-2025-10635cwe-89
Published: Wed Oct 08 2025 (10/08/2025, 06:00:03 UTC)
Source: CVE Database V5
Product: Find Me On

Description

The Find Me On WordPress plugin through 2.0.9.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing subscribers and above to perform SQL injection attacks

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 03:28:09 UTC

Technical Analysis

CVE-2025-10635 is a SQL Injection vulnerability identified in the 'Find Me On' WordPress plugin versions through 2.0.9.1. The root cause is the plugin's failure to sanitize and escape a specific parameter before embedding it into an SQL statement. This improper input handling allows authenticated users with subscriber or higher privileges to inject malicious SQL code. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) indicates that the attack can be launched remotely with low attack complexity, requires privileges (subscriber or above), no user interaction, and results in a confidentiality breach with scope change. Exploitation could allow attackers to extract sensitive information from the database, potentially exposing user data or site configuration details. Although no public exploits are currently known, the vulnerability's characteristics make it a significant risk for affected WordPress sites. The lack of available patches at the time of publication increases the urgency for mitigation. The vulnerability falls under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), a common and critical web application security issue.

Potential Impact

The primary impact of CVE-2025-10635 is the unauthorized disclosure of sensitive data stored in the WordPress site's database. Attackers with subscriber-level access can exploit the SQL Injection flaw to extract confidential information such as user credentials, personal data, or site configuration details. Although the vulnerability does not allow modification or deletion of data (no integrity or availability impact), the confidentiality breach can lead to further attacks, including privilege escalation or targeted phishing. Organizations running WordPress sites with the 'Find Me On' plugin are at risk of data leakage, which can damage reputation, violate privacy regulations, and result in financial penalties. The vulnerability's ease of exploitation and remote attack vector increase the likelihood of exploitation attempts, especially in environments with many subscribers or contributors. The absence of known exploits in the wild currently limits immediate widespread impact, but the potential for rapid weaponization exists once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2025-10635, organizations should immediately upgrade the 'Find Me On' plugin to a version that addresses this vulnerability once available. In the absence of an official patch, administrators should consider temporarily disabling the plugin to eliminate the attack surface. Additionally, restricting subscriber-level permissions to only trusted users can reduce risk. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the vulnerable parameter can provide interim protection. Regularly auditing user roles and monitoring database query logs for suspicious activity can help detect exploitation attempts. Developers maintaining the plugin should apply secure coding practices by properly sanitizing and escaping all user inputs before SQL query construction, preferably using parameterized queries or prepared statements. Finally, organizations should ensure that WordPress core and all plugins are kept up to date and conduct periodic security assessments to identify similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-09-17T13:13:58.985Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68e60222b199f1604119595f

Added to database: 10/8/2025, 6:18:10 AM

Last enriched: 4/3/2026, 3:28:09 AM

Last updated: 5/9/2026, 11:24:15 PM

Views: 146

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses