CVE-2025-10635: CWE-89 SQL Injection in Find Me On
The Find Me On WordPress plugin through 2.0.9.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing subscribers and above to perform SQL injection attacks
AI Analysis
Technical Summary
CVE-2025-10635 is a SQL Injection vulnerability identified in the 'Find Me On' WordPress plugin versions through 2.0.9.1. The root cause is the plugin's failure to sanitize and escape a specific parameter before embedding it into an SQL statement. This improper input handling allows authenticated users with subscriber or higher privileges to inject malicious SQL code. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) indicates that the attack can be launched remotely with low attack complexity, requires privileges (subscriber or above), no user interaction, and results in a confidentiality breach with scope change. Exploitation could allow attackers to extract sensitive information from the database, potentially exposing user data or site configuration details. Although no public exploits are currently known, the vulnerability's characteristics make it a significant risk for affected WordPress sites. The lack of available patches at the time of publication increases the urgency for mitigation. The vulnerability falls under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), a common and critical web application security issue.
Potential Impact
The primary impact of CVE-2025-10635 is the unauthorized disclosure of sensitive data stored in the WordPress site's database. Attackers with subscriber-level access can exploit the SQL Injection flaw to extract confidential information such as user credentials, personal data, or site configuration details. Although the vulnerability does not allow modification or deletion of data (no integrity or availability impact), the confidentiality breach can lead to further attacks, including privilege escalation or targeted phishing. Organizations running WordPress sites with the 'Find Me On' plugin are at risk of data leakage, which can damage reputation, violate privacy regulations, and result in financial penalties. The vulnerability's ease of exploitation and remote attack vector increase the likelihood of exploitation attempts, especially in environments with many subscribers or contributors. The absence of known exploits in the wild currently limits immediate widespread impact, but the potential for rapid weaponization exists once exploit code becomes available.
Mitigation Recommendations
To mitigate CVE-2025-10635, organizations should immediately upgrade the 'Find Me On' plugin to a version that addresses this vulnerability once available. In the absence of an official patch, administrators should consider temporarily disabling the plugin to eliminate the attack surface. Additionally, restricting subscriber-level permissions to only trusted users can reduce risk. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the vulnerable parameter can provide interim protection. Regularly auditing user roles and monitoring database query logs for suspicious activity can help detect exploitation attempts. Developers maintaining the plugin should apply secure coding practices by properly sanitizing and escaping all user inputs before SQL query construction, preferably using parameterized queries or prepared statements. Finally, organizations should ensure that WordPress core and all plugins are kept up to date and conduct periodic security assessments to identify similar vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-10635: CWE-89 SQL Injection in Find Me On
Description
The Find Me On WordPress plugin through 2.0.9.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing subscribers and above to perform SQL injection attacks
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-10635 is a SQL Injection vulnerability identified in the 'Find Me On' WordPress plugin versions through 2.0.9.1. The root cause is the plugin's failure to sanitize and escape a specific parameter before embedding it into an SQL statement. This improper input handling allows authenticated users with subscriber or higher privileges to inject malicious SQL code. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) indicates that the attack can be launched remotely with low attack complexity, requires privileges (subscriber or above), no user interaction, and results in a confidentiality breach with scope change. Exploitation could allow attackers to extract sensitive information from the database, potentially exposing user data or site configuration details. Although no public exploits are currently known, the vulnerability's characteristics make it a significant risk for affected WordPress sites. The lack of available patches at the time of publication increases the urgency for mitigation. The vulnerability falls under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), a common and critical web application security issue.
Potential Impact
The primary impact of CVE-2025-10635 is the unauthorized disclosure of sensitive data stored in the WordPress site's database. Attackers with subscriber-level access can exploit the SQL Injection flaw to extract confidential information such as user credentials, personal data, or site configuration details. Although the vulnerability does not allow modification or deletion of data (no integrity or availability impact), the confidentiality breach can lead to further attacks, including privilege escalation or targeted phishing. Organizations running WordPress sites with the 'Find Me On' plugin are at risk of data leakage, which can damage reputation, violate privacy regulations, and result in financial penalties. The vulnerability's ease of exploitation and remote attack vector increase the likelihood of exploitation attempts, especially in environments with many subscribers or contributors. The absence of known exploits in the wild currently limits immediate widespread impact, but the potential for rapid weaponization exists once exploit code becomes available.
Mitigation Recommendations
To mitigate CVE-2025-10635, organizations should immediately upgrade the 'Find Me On' plugin to a version that addresses this vulnerability once available. In the absence of an official patch, administrators should consider temporarily disabling the plugin to eliminate the attack surface. Additionally, restricting subscriber-level permissions to only trusted users can reduce risk. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the vulnerable parameter can provide interim protection. Regularly auditing user roles and monitoring database query logs for suspicious activity can help detect exploitation attempts. Developers maintaining the plugin should apply secure coding practices by properly sanitizing and escaping all user inputs before SQL query construction, preferably using parameterized queries or prepared statements. Finally, organizations should ensure that WordPress core and all plugins are kept up to date and conduct periodic security assessments to identify similar vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-09-17T13:13:58.985Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68e60222b199f1604119595f
Added to database: 10/8/2025, 6:18:10 AM
Last enriched: 4/3/2026, 3:28:09 AM
Last updated: 5/10/2026, 3:45:14 PM
Views: 147
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.