CVE-2025-13138: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in listingthemes WP Directory Kit
CVE-2025-13138 is a high-severity SQL Injection vulnerability in the WP Directory Kit WordPress plugin, affecting all versions up to 1. 4. 3. It arises from improper sanitization of the 'columns_search' parameter in the select_2_ajax() function, allowing unauthenticated attackers to inject malicious SQL queries. This can lead to unauthorized extraction of sensitive database information without requiring user interaction or authentication. Although no known exploits are currently active in the wild, the vulnerability's ease of exploitation and potential impact on confidentiality make it a significant risk. European organizations using this plugin on WordPress sites are at risk of data breaches. Mitigation involves updating the plugin once a patch is released or applying custom input validation and query parameterization. Countries with high WordPress adoption and active use of this plugin, such as Germany, the UK, and France, are most likely to be affected. The vulnerability has a CVSS score of 7.
AI Analysis
Technical Summary
CVE-2025-13138 is a SQL Injection vulnerability identified in the WP Directory Kit plugin for WordPress, specifically affecting all versions up to and including 1.4.3. The vulnerability is located in the select_2_ajax() function, where the 'columns_search' parameter is used directly in SQL queries without proper escaping or parameterization. This improper neutralization of special elements (CWE-89) allows an unauthenticated attacker to inject arbitrary SQL commands by manipulating the 'columns_search' input. Because the plugin fails to sanitize this user-supplied input adequately, attackers can append additional SQL statements to the existing query, potentially extracting sensitive information such as user data, credentials, or other confidential database contents. The vulnerability does not require any authentication or user interaction, increasing its risk profile. The CVSS 3.1 base score of 7.5 reflects the network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on confidentiality, with no impact on integrity or availability. Currently, no public exploits or active exploitation campaigns have been reported, but the vulnerability's presence in a popular WordPress plugin makes it a likely target for attackers once exploit code becomes available. The lack of an official patch at the time of disclosure means that affected sites remain vulnerable until mitigations or updates are applied.
Potential Impact
For European organizations, this vulnerability poses a significant risk of unauthorized data disclosure from WordPress sites using the WP Directory Kit plugin. Sensitive customer information, internal data, or credentials stored in the database could be exposed, leading to privacy violations and regulatory non-compliance, particularly under GDPR. The ability for unauthenticated attackers to exploit this vulnerability remotely increases the attack surface, especially for public-facing websites. Data breaches resulting from this vulnerability could damage organizational reputation, incur financial penalties, and disrupt business operations. Additionally, attackers could use extracted data to facilitate further attacks such as phishing or lateral movement within networks. The impact is heightened for organizations relying heavily on WordPress for directory or listing services, common in sectors like real estate, local business directories, and professional services across Europe.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to vulnerable endpoints, such as limiting or blocking access to the select_2_ajax() function via web application firewalls (WAFs) or server-level rules. Implementing strict input validation and sanitization for the 'columns_search' parameter can reduce exploitation risk until an official patch is available. Organizations should monitor plugin updates closely and apply patches promptly once released by the vendor. Employing parameterized queries or prepared statements in custom code can prevent SQL injection. Regular security audits and vulnerability scanning of WordPress plugins are recommended to identify similar issues proactively. Additionally, logging and monitoring database queries and web traffic for anomalous patterns can help detect exploitation attempts early. Backup strategies should be reviewed to ensure rapid recovery in case of compromise.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-13138: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in listingthemes WP Directory Kit
Description
CVE-2025-13138 is a high-severity SQL Injection vulnerability in the WP Directory Kit WordPress plugin, affecting all versions up to 1. 4. 3. It arises from improper sanitization of the 'columns_search' parameter in the select_2_ajax() function, allowing unauthenticated attackers to inject malicious SQL queries. This can lead to unauthorized extraction of sensitive database information without requiring user interaction or authentication. Although no known exploits are currently active in the wild, the vulnerability's ease of exploitation and potential impact on confidentiality make it a significant risk. European organizations using this plugin on WordPress sites are at risk of data breaches. Mitigation involves updating the plugin once a patch is released or applying custom input validation and query parameterization. Countries with high WordPress adoption and active use of this plugin, such as Germany, the UK, and France, are most likely to be affected. The vulnerability has a CVSS score of 7.
AI-Powered Analysis
Technical Analysis
CVE-2025-13138 is a SQL Injection vulnerability identified in the WP Directory Kit plugin for WordPress, specifically affecting all versions up to and including 1.4.3. The vulnerability is located in the select_2_ajax() function, where the 'columns_search' parameter is used directly in SQL queries without proper escaping or parameterization. This improper neutralization of special elements (CWE-89) allows an unauthenticated attacker to inject arbitrary SQL commands by manipulating the 'columns_search' input. Because the plugin fails to sanitize this user-supplied input adequately, attackers can append additional SQL statements to the existing query, potentially extracting sensitive information such as user data, credentials, or other confidential database contents. The vulnerability does not require any authentication or user interaction, increasing its risk profile. The CVSS 3.1 base score of 7.5 reflects the network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on confidentiality, with no impact on integrity or availability. Currently, no public exploits or active exploitation campaigns have been reported, but the vulnerability's presence in a popular WordPress plugin makes it a likely target for attackers once exploit code becomes available. The lack of an official patch at the time of disclosure means that affected sites remain vulnerable until mitigations or updates are applied.
Potential Impact
For European organizations, this vulnerability poses a significant risk of unauthorized data disclosure from WordPress sites using the WP Directory Kit plugin. Sensitive customer information, internal data, or credentials stored in the database could be exposed, leading to privacy violations and regulatory non-compliance, particularly under GDPR. The ability for unauthenticated attackers to exploit this vulnerability remotely increases the attack surface, especially for public-facing websites. Data breaches resulting from this vulnerability could damage organizational reputation, incur financial penalties, and disrupt business operations. Additionally, attackers could use extracted data to facilitate further attacks such as phishing or lateral movement within networks. The impact is heightened for organizations relying heavily on WordPress for directory or listing services, common in sectors like real estate, local business directories, and professional services across Europe.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to vulnerable endpoints, such as limiting or blocking access to the select_2_ajax() function via web application firewalls (WAFs) or server-level rules. Implementing strict input validation and sanitization for the 'columns_search' parameter can reduce exploitation risk until an official patch is available. Organizations should monitor plugin updates closely and apply patches promptly once released by the vendor. Employing parameterized queries or prepared statements in custom code can prevent SQL injection. Regular security audits and vulnerability scanning of WordPress plugins are recommended to identify similar issues proactively. Additionally, logging and monitoring database queries and web traffic for anomalous patterns can help detect exploitation attempts early. Backup strategies should be reviewed to ensure rapid recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-13T18:46:29.325Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692032ceb6fc887540a02d53
Added to database: 11/21/2025, 9:37:18 AM
Last enriched: 11/28/2025, 10:58:19 AM
Last updated: 1/7/2026, 5:27:04 AM
Views: 89
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.