Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14153: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in vikasratudi Page Expire Popup/Redirection for WordPress

0
Medium
VulnerabilityCVE-2025-14153cvecve-2025-14153cwe-89
Published: Tue Jan 06 2026 (01/06/2026, 03:21:39 UTC)
Source: CVE Database V5
Vendor/Project: vikasratudi
Product: Page Expire Popup/Redirection for WordPress

Description

The Page Expire Popup/Redirection for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the 'id' shortcode attribute in all versions up to, and including, 1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Author-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 01/06/2026, 03:53:22 UTC

Technical Analysis

CVE-2025-14153 identifies a time-based SQL Injection vulnerability in the Page Expire Popup/Redirection plugin for WordPress, maintained by vikasratudi. The flaw exists in all versions up to and including 1.0 due to insufficient escaping and lack of prepared statements for the 'id' shortcode attribute. Authenticated attackers with Author-level privileges or higher can exploit this vulnerability by injecting malicious SQL code into the 'id' parameter, which is incorporated directly into SQL queries without proper sanitization. This allows attackers to append additional SQL commands, potentially extracting sensitive information from the WordPress database, such as user credentials, configuration data, or other confidential content. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS 3.1 base score is 6.5 (medium severity), reflecting high confidentiality impact but no impact on integrity or availability. No patches or known exploits are currently available, increasing the urgency for organizations to implement mitigating controls. The vulnerability is classified under CWE-89, indicating improper neutralization of special elements in SQL commands. Given WordPress's widespread use in Europe, this vulnerability could be leveraged to compromise websites and extract sensitive data if left unaddressed.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data stored in WordPress databases. Organizations relying on the affected plugin may face unauthorized data disclosure, including user information and potentially sensitive business data. Since the exploit requires authenticated Author-level access, attackers could leverage compromised or weak credentials to escalate their impact. The vulnerability does not affect data integrity or availability directly but could facilitate further attacks by exposing critical information. This is particularly concerning for sectors such as finance, healthcare, and government, where data privacy is paramount and regulated under GDPR. The medium severity score indicates a moderate but actionable threat that could lead to reputational damage, regulatory penalties, and operational disruptions if exploited. European organizations with public-facing WordPress sites using this plugin should consider the risk of targeted attacks, especially in countries with high WordPress adoption and active threat actor presence.

Mitigation Recommendations

1. Immediately restrict Author-level and higher privileges to trusted users only, reducing the risk of exploitation. 2. Implement strict input validation and sanitization on the 'id' shortcode attribute to prevent injection of malicious SQL code. 3. Employ Web Application Firewalls (WAFs) with rules tailored to detect and block SQL Injection attempts targeting this plugin. 4. Monitor database query logs for unusual or unexpected queries that could indicate exploitation attempts. 5. If possible, disable or remove the Page Expire Popup/Redirection plugin until a patched version is released. 6. Enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. 7. Regularly audit WordPress user roles and permissions to ensure least privilege principles are applied. 8. Stay updated with vendor advisories and apply patches promptly once available. 9. Consider isolating WordPress instances or using containerization to limit the blast radius of potential exploits. 10. Conduct security awareness training for administrators and content authors regarding the risks of elevated privileges and plugin vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-05T19:52:57.279Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695c838f3839e44175cef8f7

Added to database: 1/6/2026, 3:37:51 AM

Last enriched: 1/6/2026, 3:53:22 AM

Last updated: 1/8/2026, 2:27:30 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats