Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10652: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in robcore89 Robcore Netatmo

0
Medium
VulnerabilityCVE-2025-10652cvecve-2025-10652cwe-89
Published: Sat Sep 20 2025 (09/20/2025, 01:53:42 UTC)
Source: CVE Database V5
Vendor/Project: robcore89
Product: Robcore Netatmo

Description

The Robcore Netatmo plugin for WordPress is vulnerable to SQL Injection via the ‘module_id’ attribute of the robcore-netatmo shortcode in all versions up to, and including, 1.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 18:32:40 UTC

Technical Analysis

CVE-2025-10652 is a SQL Injection vulnerability identified in the Robcore Netatmo plugin for WordPress, affecting all versions up to and including 1.7. The vulnerability stems from insufficient escaping and lack of prepared statements when processing the 'module_id' attribute within the robcore-netatmo shortcode. Authenticated users with Contributor-level permissions or higher can exploit this flaw by injecting additional SQL commands into existing queries. This improper neutralization of special elements in SQL commands (CWE-89) allows attackers to extract sensitive information from the underlying database, such as user credentials, configuration data, or other confidential content stored by the WordPress site. The vulnerability does not require user interaction beyond authentication and has a CVSS 3.1 base score of 6.5, indicating medium severity. The attack vector is network-based with low attack complexity and privileges required at the Contributor level, but it does not impact data integrity or availability. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The lack of patch links suggests that fixes may not yet be available, emphasizing the need for interim mitigations.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of sensitive data from the WordPress database, which can include user information, site configurations, and potentially other confidential content. Organizations using the Robcore Netatmo plugin are at risk of data breaches if attackers gain Contributor-level access, which is a relatively low privilege level often granted to trusted users or contributors. While the vulnerability does not allow modification or deletion of data, the exposure of sensitive information can lead to further attacks, such as credential theft, privilege escalation, or targeted phishing campaigns. The medium severity rating reflects the balance between the ease of exploitation (low complexity, authenticated) and the impact (confidentiality breach without integrity or availability loss). This vulnerability could undermine trust in affected websites, cause compliance issues related to data protection regulations, and result in reputational damage. Since WordPress powers a significant portion of the web, and plugins are a common attack vector, the threat has broad implications for website security worldwide.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first monitor for and apply any official patches or updates released by the Robcore89 project as soon as they become available. In the absence of patches, restrict Contributor-level and higher permissions to trusted users only, minimizing the risk of exploitation by malicious insiders or compromised accounts. Implement Web Application Firewalls (WAFs) with SQL injection detection and prevention rules tailored to detect anomalous queries involving the 'module_id' parameter or shortcode usage. Conduct regular audits of user roles and permissions to ensure least privilege principles are enforced. Additionally, consider disabling or removing the Robcore Netatmo plugin if it is not essential to reduce the attack surface. Developers and site administrators should review and refactor any custom code or shortcode implementations to use parameterized queries and proper input validation. Finally, maintain comprehensive logging and monitoring to detect suspicious database query patterns indicative of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-17T19:13:13.559Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ce0ffa4b8a032c4fafda28

Added to database: 9/20/2025, 2:22:50 AM

Last enriched: 2/27/2026, 6:32:40 PM

Last updated: 3/24/2026, 8:38:57 AM

Views: 115

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses