CVE-2025-11691: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in themeisle PPOM – Product Addons & Custom Fields for WooCommerce
The PPOM – Product Addons & Custom Fields for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the PPOM_Meta::get_fields_by_id() function in all versions up to, and including, 33.0.15 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This is only exploitable when the Enable Legacy Price Calculations setting is enabled.
AI Analysis
Technical Summary
CVE-2025-11691 is a SQL Injection vulnerability identified in the PPOM – Product Addons & Custom Fields for WooCommerce plugin for WordPress, specifically in the PPOM_Meta::get_fields_by_id() function. This vulnerability arises from improper neutralization of special elements used in SQL commands (CWE-89), where user-supplied input is insufficiently escaped and the SQL query lacks proper preparation, allowing attackers to append arbitrary SQL commands. The vulnerability affects all versions up to and including 33.0.15 and is exploitable only when the 'Enable Legacy Price Calculations' setting is enabled. Notably, exploitation does not require any authentication or user interaction, making it remotely exploitable by unauthenticated attackers. Successful exploitation can lead to unauthorized extraction of sensitive information from the backend database, compromising confidentiality. The CVSS v3.1 score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and high confidentiality impact. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to WooCommerce-based e-commerce sites using this plugin with legacy price calculations enabled. The lack of prepared statements and insufficient input sanitization are the root causes, highlighting the need for secure coding practices in plugin development. Since the plugin is widely used in WordPress e-commerce environments, the vulnerability could affect a broad range of organizations, especially those handling sensitive customer and transaction data.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive customer and transactional data stored in WooCommerce databases. Exploitation could lead to unauthorized data disclosure, including personal identifiable information (PII), payment details, and business-sensitive information. This can result in regulatory non-compliance under GDPR, leading to legal penalties and reputational damage. The vulnerability's unauthenticated and remote exploitability increases the attack surface, making it easier for threat actors to target vulnerable e-commerce sites. The impact is particularly severe for online retailers and service providers relying on WooCommerce with the affected plugin and legacy price calculations enabled. While integrity and availability are not directly impacted, the loss of confidentiality alone can have cascading effects, including customer trust erosion and financial losses. Additionally, attackers could use extracted data to facilitate further attacks such as phishing or fraud. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future exploitation. Organizations must prioritize remediation to protect their data and maintain compliance with European data protection laws.
Mitigation Recommendations
European organizations should immediately verify if the PPOM – Product Addons & Custom Fields for WooCommerce plugin is installed and identify the version in use. If the version is up to 33.0.15, they should check whether the 'Enable Legacy Price Calculations' setting is enabled; if so, disable this setting as a temporary mitigation to prevent exploitation. Organizations should monitor the plugin vendor’s communications for patches addressing this vulnerability and apply them promptly once available. In the interim, implement web application firewall (WAF) rules to detect and block SQL injection attempts targeting the vulnerable function. Conduct thorough security audits of WooCommerce installations to identify and remediate other potential vulnerabilities. Limit database user permissions to the minimum necessary to reduce the impact of any potential SQL injection. Employ database activity monitoring to detect suspicious query patterns. Educate development and IT teams on secure coding practices, emphasizing the use of prepared statements and proper input sanitization. Regularly back up databases and test restoration procedures to minimize downtime in case of compromise. Finally, maintain up-to-date threat intelligence feeds to stay informed about emerging exploits related to this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-11691: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in themeisle PPOM – Product Addons & Custom Fields for WooCommerce
Description
The PPOM – Product Addons & Custom Fields for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the PPOM_Meta::get_fields_by_id() function in all versions up to, and including, 33.0.15 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This is only exploitable when the Enable Legacy Price Calculations setting is enabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-11691 is a SQL Injection vulnerability identified in the PPOM – Product Addons & Custom Fields for WooCommerce plugin for WordPress, specifically in the PPOM_Meta::get_fields_by_id() function. This vulnerability arises from improper neutralization of special elements used in SQL commands (CWE-89), where user-supplied input is insufficiently escaped and the SQL query lacks proper preparation, allowing attackers to append arbitrary SQL commands. The vulnerability affects all versions up to and including 33.0.15 and is exploitable only when the 'Enable Legacy Price Calculations' setting is enabled. Notably, exploitation does not require any authentication or user interaction, making it remotely exploitable by unauthenticated attackers. Successful exploitation can lead to unauthorized extraction of sensitive information from the backend database, compromising confidentiality. The CVSS v3.1 score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and high confidentiality impact. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to WooCommerce-based e-commerce sites using this plugin with legacy price calculations enabled. The lack of prepared statements and insufficient input sanitization are the root causes, highlighting the need for secure coding practices in plugin development. Since the plugin is widely used in WordPress e-commerce environments, the vulnerability could affect a broad range of organizations, especially those handling sensitive customer and transaction data.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive customer and transactional data stored in WooCommerce databases. Exploitation could lead to unauthorized data disclosure, including personal identifiable information (PII), payment details, and business-sensitive information. This can result in regulatory non-compliance under GDPR, leading to legal penalties and reputational damage. The vulnerability's unauthenticated and remote exploitability increases the attack surface, making it easier for threat actors to target vulnerable e-commerce sites. The impact is particularly severe for online retailers and service providers relying on WooCommerce with the affected plugin and legacy price calculations enabled. While integrity and availability are not directly impacted, the loss of confidentiality alone can have cascading effects, including customer trust erosion and financial losses. Additionally, attackers could use extracted data to facilitate further attacks such as phishing or fraud. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future exploitation. Organizations must prioritize remediation to protect their data and maintain compliance with European data protection laws.
Mitigation Recommendations
European organizations should immediately verify if the PPOM – Product Addons & Custom Fields for WooCommerce plugin is installed and identify the version in use. If the version is up to 33.0.15, they should check whether the 'Enable Legacy Price Calculations' setting is enabled; if so, disable this setting as a temporary mitigation to prevent exploitation. Organizations should monitor the plugin vendor’s communications for patches addressing this vulnerability and apply them promptly once available. In the interim, implement web application firewall (WAF) rules to detect and block SQL injection attempts targeting the vulnerable function. Conduct thorough security audits of WooCommerce installations to identify and remediate other potential vulnerabilities. Limit database user permissions to the minimum necessary to reduce the impact of any potential SQL injection. Employ database activity monitoring to detect suspicious query patterns. Educate development and IT teams on secure coding practices, emphasizing the use of prepared statements and proper input sanitization. Regularly back up databases and test restoration procedures to minimize downtime in case of compromise. Finally, maintain up-to-date threat intelligence feeds to stay informed about emerging exploits related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-13T15:24:04.178Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f33944197c8629076f80e0
Added to database: 10/18/2025, 6:52:52 AM
Last enriched: 10/18/2025, 7:07:49 AM
Last updated: 10/19/2025, 2:23:44 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11940: Uncontrolled Search Path in LibreWolf
HighCVE-2025-11939: Path Traversal in ChurchCRM
MediumCVE-2025-11938: Deserialization in ChurchCRM
MediumCVE-2025-62672: CWE-770 Allocation of Resources Without Limits or Throttling in boyns rplay
MediumCVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.