Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13370: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ov3rkll ProjectList

0
Medium
VulnerabilityCVE-2025-13370cvecve-2025-13370cwe-89
Published: Tue Nov 25 2025 (11/25/2025, 07:28:26 UTC)
Source: CVE Database V5
Vendor/Project: ov3rkll
Product: ProjectList

Description

The ProjectList plugin for WordPress is vulnerable to time-based SQL Injection via the 'id' parameter in all versions up to, and including, 0.3.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Editor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 11/25/2025, 08:02:44 UTC

Technical Analysis

CVE-2025-13370 identifies a SQL Injection vulnerability in the ProjectList plugin for WordPress, affecting all versions up to and including 0.3.0. The flaw arises from improper neutralization of special elements in SQL commands (CWE-89), specifically due to insufficient escaping of the 'id' parameter supplied by users. This parameter is used in SQL queries without adequate preparation or parameterization, enabling attackers with Editor-level or higher privileges to append malicious SQL code. The attack vector is time-based SQL Injection, which allows an attacker to infer database content by measuring response delays. Exploitation requires authenticated access with elevated privileges but does not require user interaction beyond that. The vulnerability compromises confidentiality by allowing unauthorized data extraction but does not affect data integrity or availability. The CVSS 3.1 score of 4.9 reflects a medium severity, considering the network attack vector, low attack complexity, and requirement for high privileges. No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The vulnerability was reserved and published in November 2025 by Wordfence. Given the widespread use of WordPress in Europe and the potential for sensitive data exposure, this vulnerability poses a moderate risk to organizations using the affected plugin.

Potential Impact

For European organizations, the primary impact of CVE-2025-13370 is the potential unauthorized disclosure of sensitive data stored in WordPress databases via the ProjectList plugin. Since exploitation requires Editor-level access, the threat is mainly from insider threats or compromised accounts with elevated privileges. Confidentiality breaches could expose customer data, intellectual property, or internal business information, leading to reputational damage, regulatory penalties (e.g., GDPR violations), and potential financial losses. The vulnerability does not directly affect data integrity or availability, so operational disruption is unlikely. However, attackers could leverage extracted information for further attacks or lateral movement within the network. Organizations with extensive WordPress deployments, especially those using the ProjectList plugin, face increased risk. The absence of known exploits reduces immediate threat but does not eliminate future risk, especially if attackers develop automated tools. European entities in sectors with strict data protection requirements (finance, healthcare, government) are particularly vulnerable to the confidentiality impact.

Mitigation Recommendations

1. Immediately audit and restrict Editor-level and higher privileges to trusted personnel only, minimizing the attack surface. 2. Implement strict input validation and sanitization on the 'id' parameter at the application or web server level as a temporary workaround. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the ProjectList plugin. 4. Monitor WordPress logs and database query logs for unusual or time-delayed responses indicative of time-based SQL injection attempts. 5. Regularly update WordPress core and plugins, and apply the official patch from the vendor once released. 6. Conduct security awareness training emphasizing the risks of privilege misuse and credential compromise. 7. Consider isolating WordPress instances or using database access controls to limit the impact of potential data extraction. 8. Use multi-factor authentication to reduce the risk of account compromise for users with elevated privileges.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-18T18:09:21.567Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69255e28292ce6fc00be05f8

Added to database: 11/25/2025, 7:43:36 AM

Last enriched: 11/25/2025, 8:02:44 AM

Last updated: 12/2/2025, 12:08:44 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats