Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13724: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in e4jvikwp VikRentCar Car Rental Management System

0
High
VulnerabilityCVE-2025-13724cvecve-2025-13724cwe-89
Published: Tue Dec 02 2025 (12/02/2025, 08:24:54 UTC)
Source: CVE Database V5
Vendor/Project: e4jvikwp
Product: VikRentCar Car Rental Management System

Description

The VikRentCar Car Rental Management System plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'month' parameter in all versions up to, and including, 1.4.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 12/02/2025, 14:20:03 UTC

Technical Analysis

CVE-2025-13724 is a SQL Injection vulnerability classified under CWE-89, found in the VikRentCar Car Rental Management System plugin for WordPress, affecting all versions up to 1.4.4. The vulnerability arises from insufficient escaping and lack of prepared statements when processing the 'month' parameter in SQL queries. This improper neutralization of special SQL elements allows an authenticated attacker with Administrator privileges to inject additional SQL commands into existing queries. The attack vector is network-based, requiring no user interaction but does require administrative access, which limits the attack surface but does not eliminate risk. The vulnerability is time-based blind SQL Injection, meaning attackers can infer data by measuring response times, enabling extraction of sensitive information such as user credentials, booking details, or payment information stored in the database. The plugin is widely used in WordPress environments managing car rental services, making the vulnerability relevant to organizations relying on this software. No patches or official fixes are currently available, and no exploits have been observed in the wild, but the vulnerability's presence in a critical business application elevates its risk profile. The CVSS 3.1 score of 7.5 reflects high confidentiality impact, low attack complexity, and no requirement for user interaction.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure of sensitive customer and business data, including personal identification, payment information, and rental records. This breach of confidentiality could result in regulatory penalties under GDPR, reputational damage, and financial losses. Since the vulnerability requires administrator-level access, the risk is heightened if internal accounts are compromised or if attackers gain administrative credentials through phishing or other means. The car rental industry is significant in Europe, with many SMEs and large enterprises relying on WordPress plugins like VikRentCar for booking management. A successful attack could disrupt business operations indirectly by eroding customer trust and triggering compliance investigations. Additionally, attackers could leverage extracted data for further targeted attacks or fraud. The lack of known exploits reduces immediate risk but does not preclude future exploitation, especially as attackers often develop exploits after vulnerability disclosure.

Mitigation Recommendations

European organizations using VikRentCar should immediately audit their WordPress installations for the plugin version and restrict administrator access to trusted personnel only. Implementing strict access controls and multi-factor authentication for admin accounts can reduce the risk of credential compromise. Since no official patch is currently available, organizations should consider temporarily disabling the plugin or restricting access to the vulnerable functionality via web application firewalls (WAF) with custom rules to detect and block suspicious SQL injection patterns targeting the 'month' parameter. Regular database backups and monitoring for unusual query patterns or access logs can help detect exploitation attempts early. Organizations should also engage with the vendor or community to track patch releases and apply updates promptly once available. Additionally, conducting internal security training to prevent credential theft and maintaining updated intrusion detection systems will further mitigate risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-25T22:27:24.607Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692ef5303a1612a9372cbac8

Added to database: 12/2/2025, 2:18:24 PM

Last enriched: 12/2/2025, 2:20:03 PM

Last updated: 12/2/2025, 4:32:47 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats