Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13370: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ov3rkll ProjectList

0
Medium
VulnerabilityCVE-2025-13370cvecve-2025-13370cwe-89
Published: Tue Nov 25 2025 (11/25/2025, 07:28:26 UTC)
Source: CVE Database V5
Vendor/Project: ov3rkll
Product: ProjectList

Description

CVE-2025-13370 is a medium severity SQL Injection vulnerability in the ProjectList WordPress plugin (versions up to 0. 3. 0). It allows authenticated users with Editor-level or higher privileges to exploit insufficient input sanitization on the 'id' parameter, enabling time-based SQL injection attacks. This can lead to unauthorized extraction of sensitive database information without impacting data integrity or availability. The vulnerability requires no user interaction but does require elevated privileges, limiting the attack surface. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue to prevent potential data leakage. Countries with high WordPress adoption and significant use of this plugin, especially those with targeted industries relying on WordPress content management, are at greater risk.

AI-Powered Analysis

AILast updated: 12/02/2025, 14:50:08 UTC

Technical Analysis

CVE-2025-13370 identifies a time-based SQL Injection vulnerability in the ProjectList plugin for WordPress, affecting all versions up to and including 0.3.0. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89), specifically due to insufficient escaping and lack of prepared statements for the 'id' parameter in SQL queries. Authenticated attackers with Editor-level or higher privileges can exploit this flaw by injecting malicious SQL code into the 'id' parameter, which is then concatenated into existing SQL queries without proper sanitization. This allows attackers to perform time-based blind SQL injection attacks, enabling them to extract sensitive information from the backend database. The attack vector is remote and network-based, requiring no user interaction but does require elevated privileges, which limits exploitation to users who already have some level of trust within the system. The vulnerability does not affect data integrity or availability directly but compromises confidentiality by exposing sensitive data. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The CVSS v3.1 score is 4.9 (medium severity), reflecting the moderate risk posed by the vulnerability given the privilege requirement and impact scope.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality of sensitive data stored in WordPress databases using the ProjectList plugin. Attackers with Editor-level access could leverage this flaw to extract confidential information such as user data, configuration details, or other sensitive content, potentially leading to privacy breaches or compliance violations under regulations like GDPR. While the vulnerability does not directly affect data integrity or availability, the exposure of sensitive data can have significant reputational and legal consequences. Organizations relying on WordPress for content management, especially those in sectors like media, education, or government that may use the ProjectList plugin, are at risk. The requirement for elevated privileges reduces the likelihood of external attackers exploiting this vulnerability without prior compromise, but insider threats or compromised accounts could be leveraged. The absence of known exploits in the wild suggests limited active exploitation currently, but the vulnerability should be addressed proactively to prevent future attacks.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability. First, they should monitor for and apply any official patches or updates from the ProjectList plugin developers as soon as they become available. In the absence of patches, organizations should consider temporarily disabling or removing the ProjectList plugin to eliminate the attack surface. Implement strict access controls to limit Editor-level and higher privileges only to trusted users, reducing the risk of exploitation by insiders or compromised accounts. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'id' parameter. Conduct regular audits of user privileges and monitor logs for unusual database query patterns indicative of SQL injection attempts. Additionally, organizations should ensure their WordPress installations and plugins follow best practices, including using prepared statements and parameterized queries, to prevent similar vulnerabilities. Finally, educating administrators and users about the risks of privilege misuse and maintaining strong authentication mechanisms can further reduce exploitation risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-18T18:09:21.567Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69255e28292ce6fc00be05f8

Added to database: 11/25/2025, 7:43:36 AM

Last enriched: 12/2/2025, 2:50:08 PM

Last updated: 1/19/2026, 7:59:43 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats