Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10862: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers

0
High
VulnerabilityCVE-2025-10862cvecve-2025-10862cwe-89
Published: Thu Oct 09 2025 (10/09/2025, 08:23:17 UTC)
Source: CVE Database V5
Vendor/Project: roxnor
Product: Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers

Description

CVE-2025-10862 is a high-severity SQL Injection vulnerability affecting the WordPress plugin 'Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers' by roxnor, in all versions up to 2. 1. 3. The flaw arises from improper sanitization of the 'id' parameter, allowing unauthenticated attackers to inject malicious SQL code. This can lead to unauthorized extraction of sensitive database information without requiring user interaction or authentication. Although no known exploits are currently in the wild, the vulnerability's ease of exploitation and potential impact on confidentiality make it a significant threat. European organizations using this plugin, especially e-commerce sites leveraging WooCommerce, are at risk. Mitigation involves promptly updating the plugin once a patch is available or applying custom input validation and query parameterization. Countries with high WordPress and WooCommerce adoption, such as Germany, the UK, France, and the Netherlands, are most likely to be affected. Defenders should prioritize vulnerability scanning and monitoring for suspicious database queries related to this plugin.

AI-Powered Analysis

AILast updated: 10/16/2025, 08:53:42 UTC

Technical Analysis

CVE-2025-10862 is a SQL Injection vulnerability classified under CWE-89, affecting the 'Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers' WordPress plugin developed by roxnor. The vulnerability exists in all versions up to and including 2.1.3 due to insufficient escaping and lack of prepared statements on the 'id' parameter used in SQL queries. This improper neutralization of special elements allows unauthenticated attackers to append arbitrary SQL commands to existing queries. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making exploitation straightforward. Successful exploitation can lead to unauthorized disclosure of sensitive data from the backend database, compromising confidentiality without affecting integrity or availability. The plugin is commonly used in WordPress sites that implement gamified popups, multi-step user interactions, page-level targeting, and WooCommerce triggers, which are prevalent in e-commerce and marketing websites. Although no public exploits have been reported yet, the vulnerability's CVSS score of 7.5 (high) reflects its significant risk. The lack of a patch at the time of reporting necessitates immediate attention from site administrators to mitigate potential exploitation.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, particularly for those operating e-commerce platforms or marketing websites using WordPress with the affected plugin. The ability for unauthenticated attackers to extract sensitive database information could lead to exposure of customer data, business intelligence, or other confidential information, potentially violating GDPR and other data protection regulations. This could result in legal penalties, reputational damage, and financial losses. The vulnerability's ease of exploitation and lack of required authentication increase the likelihood of attacks, especially targeting high-traffic websites. Additionally, compromised data could facilitate further attacks such as phishing or fraud. The impact is mainly on confidentiality, with no direct effect on data integrity or system availability, but the indirect consequences could be severe for affected organizations.

Mitigation Recommendations

1. Monitor for plugin updates from roxnor and apply patches immediately once available to address the SQL Injection vulnerability. 2. Until an official patch is released, implement web application firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'id' parameter in HTTP requests. 3. Employ input validation and sanitization at the application level, ensuring that all parameters, especially 'id', are strictly validated against expected formats (e.g., numeric only). 4. Use parameterized queries or prepared statements if modifying the plugin code is feasible to prevent injection. 5. Conduct regular security scans and penetration tests focusing on SQL injection vectors in WordPress environments. 6. Restrict database user permissions to the minimum necessary to limit data exposure in case of exploitation. 7. Monitor logs for unusual database query patterns or error messages indicative of injection attempts. 8. Educate site administrators and developers about secure coding practices and the risks of SQL injection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-22T22:58:28.462Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e772546b49b1a420925e12

Added to database: 10/9/2025, 8:29:08 AM

Last enriched: 10/16/2025, 8:53:42 AM

Last updated: 11/21/2025, 4:46:14 AM

Views: 105

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats