CVE-2025-14153: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in vikasratudi Page Expire Popup/Redirection for WordPress
The Page Expire Popup/Redirection for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the 'id' shortcode attribute in all versions up to, and including, 1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Author-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
CVE-2025-14153 identifies a time-based SQL Injection vulnerability in the Page Expire Popup/Redirection plugin for WordPress, maintained by vikasratudi. The flaw exists in all versions up to and including 1.0 due to insufficient escaping and lack of prepared statements for the 'id' shortcode attribute. Authenticated attackers with Author-level privileges or higher can exploit this vulnerability by injecting malicious SQL code into the 'id' parameter, which is incorporated directly into SQL queries without proper sanitization. This allows attackers to append additional SQL commands, potentially extracting sensitive information from the WordPress database, such as user credentials, configuration data, or other confidential content. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS 3.1 base score is 6.5 (medium severity), reflecting high confidentiality impact but no impact on integrity or availability. No patches or known exploits are currently available, increasing the urgency for organizations to implement mitigating controls. The vulnerability is classified under CWE-89, indicating improper neutralization of special elements in SQL commands. Given WordPress's widespread use in Europe, this vulnerability could be leveraged to compromise websites and extract sensitive data if left unaddressed.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data stored in WordPress databases. Organizations relying on the affected plugin may face unauthorized data disclosure, including user information and potentially sensitive business data. Since the exploit requires authenticated Author-level access, attackers could leverage compromised or weak credentials to escalate their impact. The vulnerability does not affect data integrity or availability directly but could facilitate further attacks by exposing critical information. This is particularly concerning for sectors such as finance, healthcare, and government, where data privacy is paramount and regulated under GDPR. The medium severity score indicates a moderate but actionable threat that could lead to reputational damage, regulatory penalties, and operational disruptions if exploited. European organizations with public-facing WordPress sites using this plugin should consider the risk of targeted attacks, especially in countries with high WordPress adoption and active threat actor presence.
Mitigation Recommendations
1. Immediately restrict Author-level and higher privileges to trusted users only, reducing the risk of exploitation. 2. Implement strict input validation and sanitization on the 'id' shortcode attribute to prevent injection of malicious SQL code. 3. Employ Web Application Firewalls (WAFs) with rules tailored to detect and block SQL Injection attempts targeting this plugin. 4. Monitor database query logs for unusual or unexpected queries that could indicate exploitation attempts. 5. If possible, disable or remove the Page Expire Popup/Redirection plugin until a patched version is released. 6. Enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. 7. Regularly audit WordPress user roles and permissions to ensure least privilege principles are applied. 8. Stay updated with vendor advisories and apply patches promptly once available. 9. Consider isolating WordPress instances or using containerization to limit the blast radius of potential exploits. 10. Conduct security awareness training for administrators and content authors regarding the risks of elevated privileges and plugin vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-14153: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in vikasratudi Page Expire Popup/Redirection for WordPress
Description
The Page Expire Popup/Redirection for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the 'id' shortcode attribute in all versions up to, and including, 1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Author-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Technical Analysis
CVE-2025-14153 identifies a time-based SQL Injection vulnerability in the Page Expire Popup/Redirection plugin for WordPress, maintained by vikasratudi. The flaw exists in all versions up to and including 1.0 due to insufficient escaping and lack of prepared statements for the 'id' shortcode attribute. Authenticated attackers with Author-level privileges or higher can exploit this vulnerability by injecting malicious SQL code into the 'id' parameter, which is incorporated directly into SQL queries without proper sanitization. This allows attackers to append additional SQL commands, potentially extracting sensitive information from the WordPress database, such as user credentials, configuration data, or other confidential content. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS 3.1 base score is 6.5 (medium severity), reflecting high confidentiality impact but no impact on integrity or availability. No patches or known exploits are currently available, increasing the urgency for organizations to implement mitigating controls. The vulnerability is classified under CWE-89, indicating improper neutralization of special elements in SQL commands. Given WordPress's widespread use in Europe, this vulnerability could be leveraged to compromise websites and extract sensitive data if left unaddressed.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data stored in WordPress databases. Organizations relying on the affected plugin may face unauthorized data disclosure, including user information and potentially sensitive business data. Since the exploit requires authenticated Author-level access, attackers could leverage compromised or weak credentials to escalate their impact. The vulnerability does not affect data integrity or availability directly but could facilitate further attacks by exposing critical information. This is particularly concerning for sectors such as finance, healthcare, and government, where data privacy is paramount and regulated under GDPR. The medium severity score indicates a moderate but actionable threat that could lead to reputational damage, regulatory penalties, and operational disruptions if exploited. European organizations with public-facing WordPress sites using this plugin should consider the risk of targeted attacks, especially in countries with high WordPress adoption and active threat actor presence.
Mitigation Recommendations
1. Immediately restrict Author-level and higher privileges to trusted users only, reducing the risk of exploitation. 2. Implement strict input validation and sanitization on the 'id' shortcode attribute to prevent injection of malicious SQL code. 3. Employ Web Application Firewalls (WAFs) with rules tailored to detect and block SQL Injection attempts targeting this plugin. 4. Monitor database query logs for unusual or unexpected queries that could indicate exploitation attempts. 5. If possible, disable or remove the Page Expire Popup/Redirection plugin until a patched version is released. 6. Enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. 7. Regularly audit WordPress user roles and permissions to ensure least privilege principles are applied. 8. Stay updated with vendor advisories and apply patches promptly once available. 9. Consider isolating WordPress instances or using containerization to limit the blast radius of potential exploits. 10. Conduct security awareness training for administrators and content authors regarding the risks of elevated privileges and plugin vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-05T19:52:57.279Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695c838f3839e44175cef8f7
Added to database: 1/6/2026, 3:37:51 AM
Last enriched: 1/6/2026, 3:53:22 AM
Last updated: 1/8/2026, 2:27:30 PM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21895: CWE-703: Improper Check or Handling of Exceptional Conditions in RustCrypto RSA
LowCVE-2025-8307: CWE-257 Storing Passwords in a Recoverable Format in Asseco InfoMedica Plus
MediumCVE-2025-8306: CWE-1220 Insufficient Granularity of Access Control in Asseco InfoMedica Plus
MediumCVE-2025-14025: Incorrect Execution-Assigned Permissions in Red Hat Red Hat Ansible Automation Platform 2
HighCVE-2026-21891: CWE-287: Improper Authentication in IceWhaleTech ZimaOS
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.