Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10683: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in yudiz Easy Email Subscription

0
Medium
VulnerabilityCVE-2025-10683cvecve-2025-10683cwe-89
Published: Thu Nov 06 2025 (11/06/2025, 02:31:05 UTC)
Source: CVE Database V5
Vendor/Project: yudiz
Product: Easy Email Subscription

Description

The Easy Email Subscription plugin for WordPress is vulnerable to SQL Injection via the 'uid' parameter in all versions up to, and including, 1.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 11/06/2025, 03:13:08 UTC

Technical Analysis

CVE-2025-10683 identifies a SQL Injection vulnerability in the Easy Email Subscription plugin for WordPress, developed by yudiz. The vulnerability exists in all versions up to and including 1.3 due to insufficient escaping and lack of prepared statements when processing the 'uid' parameter in SQL queries. This improper neutralization of special elements (CWE-89) allows an authenticated user with Administrator or higher privileges to append malicious SQL code to existing queries. The attack vector is network-based with low attack complexity but requires high privileges (PR:H) and no user interaction (UI:N). The vulnerability impacts confidentiality by enabling extraction of sensitive data from the database but does not affect integrity or availability. The CVSS 3.1 base score is 4.9 (medium severity), reflecting the limited scope of exploitation due to privilege requirements. No known exploits have been reported in the wild, and no official patches have been published as of now. The vulnerability was reserved in September 2025 and published in November 2025. Organizations using this plugin should be aware of the risk, especially if multiple administrators have access, as the vulnerability could be exploited internally or by attackers who have compromised admin credentials.

Potential Impact

For European organizations, the primary impact is unauthorized disclosure of sensitive information stored in the WordPress database, which may include subscriber data, email addresses, or other confidential content managed by the plugin. Since exploitation requires administrator-level access, the threat mainly arises from insider threats or attackers who have already gained elevated privileges. Data confidentiality breaches can lead to regulatory non-compliance under GDPR, resulting in legal penalties and reputational damage. The vulnerability does not directly affect data integrity or availability, so operational disruption is unlikely. However, the exposure of subscriber data could facilitate further phishing or social engineering attacks targeting European users. Organizations relying on this plugin for email subscription management should consider the sensitivity of the data involved and the potential consequences of data leakage. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially in environments with multiple administrators or weak internal controls.

Mitigation Recommendations

1. Immediately audit and restrict administrator-level access to only trusted personnel to reduce the risk of exploitation. 2. Implement strict role-based access controls and monitor administrator activities for suspicious behavior. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block anomalous SQL query patterns related to the 'uid' parameter. 4. Regularly review and sanitize all user inputs, especially those processed by plugins, and consider disabling or replacing the Easy Email Subscription plugin until a patch is available. 5. Monitor database logs for unusual query activity that may indicate attempted SQL injection. 6. Keep WordPress core and all plugins updated; apply any security patches from yudiz promptly once released. 7. Conduct internal security training to raise awareness about the risks of privilege misuse and SQL injection. 8. Consider implementing database-level protections such as least privilege for the WordPress database user to limit data exposure in case of injection. 9. Backup data regularly and ensure backups are secure to enable recovery if exploitation leads to data compromise. 10. Engage in threat intelligence sharing with industry peers to stay informed about emerging exploits related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-09-18T12:32:56.293Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690c0ec4fd0d6d226483c9f3

Added to database: 11/6/2025, 2:58:12 AM

Last enriched: 11/6/2025, 3:13:08 AM

Last updated: 11/6/2025, 6:34:59 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats