CVE-2025-10862: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
The Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 2.1.3. This is due to insufficient escaping on the 'id' parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
CVE-2025-10862 is an SQL Injection vulnerability identified in the roxnor WordPress plugin named 'Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers'. This vulnerability affects all versions up to and including 2.1.3. The root cause is insufficient escaping and lack of proper preparation of the SQL query involving the 'id' parameter. Because the plugin fails to neutralize special SQL elements, an attacker can append arbitrary SQL commands to the existing query. This flaw allows unauthenticated attackers to execute unauthorized SQL queries against the backend database, potentially extracting sensitive information such as user data, credentials, or business-critical information stored within the WordPress database. The vulnerability requires no authentication or user interaction, increasing its exploitability. The CVSS v3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) indicates network exploitable with low attack complexity, no privileges required, no user interaction, and high impact on confidentiality but no impact on integrity or availability. While no known exploits have been reported in the wild yet, the vulnerability presents a significant risk due to the widespread use of WordPress and the popularity of WooCommerce for e-commerce sites. The plugin’s targeting features and gamification elements may be used on high-traffic commercial websites, increasing the potential impact of a successful attack.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive information from the WordPress database. Attackers can leverage the SQL Injection flaw to extract confidential data such as customer information, payment details, user credentials, and other proprietary business data. This can lead to privacy violations, regulatory non-compliance, and reputational damage. Since the vulnerability does not affect data integrity or availability, it does not directly enable data modification or denial of service, but the confidentiality breach alone is critical. Organizations running e-commerce platforms using WooCommerce integrated with this plugin are particularly at risk, as theft of customer data can have severe financial and legal consequences. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks and mass scanning by threat actors. Additionally, attackers could use the extracted data for further attacks such as phishing, identity theft, or lateral movement within the network.
Mitigation Recommendations
1. Immediate update: Organizations should upgrade the roxnor Popup builder plugin to a version that patches this vulnerability once available. Monitor vendor announcements for official patches. 2. Input validation: Until a patch is applied, implement strict server-side validation and sanitization of all inputs, especially the 'id' parameter, to block malicious SQL payloads. 3. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block SQL Injection attempts targeting this plugin’s endpoints. Custom rules can be created to filter suspicious patterns in the 'id' parameter. 4. Principle of least privilege: Restrict database user permissions used by WordPress to only necessary operations, limiting the potential damage of SQL Injection. 5. Monitoring and logging: Enable detailed logging of web requests and database queries to detect anomalous activity indicative of exploitation attempts. 6. Network segmentation: Isolate critical backend systems to reduce the blast radius if an attacker exploits the vulnerability. 7. Security testing: Conduct regular vulnerability scans and penetration tests focusing on WordPress plugins to identify similar issues proactively.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, India, Brazil
CVE-2025-10862: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
Description
The Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 2.1.3. This is due to insufficient escaping on the 'id' parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-10862 is an SQL Injection vulnerability identified in the roxnor WordPress plugin named 'Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers'. This vulnerability affects all versions up to and including 2.1.3. The root cause is insufficient escaping and lack of proper preparation of the SQL query involving the 'id' parameter. Because the plugin fails to neutralize special SQL elements, an attacker can append arbitrary SQL commands to the existing query. This flaw allows unauthenticated attackers to execute unauthorized SQL queries against the backend database, potentially extracting sensitive information such as user data, credentials, or business-critical information stored within the WordPress database. The vulnerability requires no authentication or user interaction, increasing its exploitability. The CVSS v3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) indicates network exploitable with low attack complexity, no privileges required, no user interaction, and high impact on confidentiality but no impact on integrity or availability. While no known exploits have been reported in the wild yet, the vulnerability presents a significant risk due to the widespread use of WordPress and the popularity of WooCommerce for e-commerce sites. The plugin’s targeting features and gamification elements may be used on high-traffic commercial websites, increasing the potential impact of a successful attack.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive information from the WordPress database. Attackers can leverage the SQL Injection flaw to extract confidential data such as customer information, payment details, user credentials, and other proprietary business data. This can lead to privacy violations, regulatory non-compliance, and reputational damage. Since the vulnerability does not affect data integrity or availability, it does not directly enable data modification or denial of service, but the confidentiality breach alone is critical. Organizations running e-commerce platforms using WooCommerce integrated with this plugin are particularly at risk, as theft of customer data can have severe financial and legal consequences. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks and mass scanning by threat actors. Additionally, attackers could use the extracted data for further attacks such as phishing, identity theft, or lateral movement within the network.
Mitigation Recommendations
1. Immediate update: Organizations should upgrade the roxnor Popup builder plugin to a version that patches this vulnerability once available. Monitor vendor announcements for official patches. 2. Input validation: Until a patch is applied, implement strict server-side validation and sanitization of all inputs, especially the 'id' parameter, to block malicious SQL payloads. 3. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block SQL Injection attempts targeting this plugin’s endpoints. Custom rules can be created to filter suspicious patterns in the 'id' parameter. 4. Principle of least privilege: Restrict database user permissions used by WordPress to only necessary operations, limiting the potential damage of SQL Injection. 5. Monitoring and logging: Enable detailed logging of web requests and database queries to detect anomalous activity indicative of exploitation attempts. 6. Network segmentation: Isolate critical backend systems to reduce the blast radius if an attacker exploits the vulnerability. 7. Security testing: Conduct regular vulnerability scans and penetration tests focusing on WordPress plugins to identify similar issues proactively.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-22T22:58:28.462Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e772546b49b1a420925e12
Added to database: 10/9/2025, 8:29:08 AM
Last enriched: 2/27/2026, 6:41:59 PM
Last updated: 3/24/2026, 11:56:36 PM
Views: 166
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.