CVE-2025-14153: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in vikasratudi Page Expire Popup/Redirection for WordPress
The Page Expire Popup/Redirection for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the 'id' shortcode attribute in all versions up to, and including, 1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Author-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
CVE-2025-14153 identifies a time-based SQL Injection vulnerability in the Page Expire Popup/Redirection plugin for WordPress, maintained by vikasratudi. The vulnerability exists in all versions up to and including 1.0 due to insufficient escaping and lack of prepared statements when processing the 'id' shortcode attribute. Authenticated users with Author-level or higher privileges can exploit this flaw by injecting additional SQL queries into existing database commands. This injection is time-based, allowing attackers to infer sensitive information from the database by measuring response delays. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The flaw specifically affects the confidentiality of data, as attackers can extract sensitive information, but it does not affect data integrity or availability. The CVSS 3.1 score of 6.5 reflects the network attack vector, low attack complexity, required privileges, and high confidentiality impact. No patches are currently linked, and no known exploits have been reported in the wild, indicating the need for proactive mitigation. The vulnerability stems from CWE-89, which involves improper neutralization of special elements in SQL commands, a common and critical web application security issue.
Potential Impact
This vulnerability primarily threatens the confidentiality of data stored in WordPress databases using the affected plugin. Attackers with Author-level access can exploit the SQL Injection to extract sensitive information such as user credentials, personal data, or configuration details. While the vulnerability does not directly compromise data integrity or availability, the exposure of sensitive data can lead to further attacks, including privilege escalation or targeted phishing. Organizations relying on this plugin risk data breaches that can damage reputation, incur regulatory penalties, and disrupt business operations. Since the exploit requires authenticated access, the risk is somewhat mitigated by internal controls; however, compromised or malicious insiders pose a significant threat. The lack of known exploits in the wild suggests limited current exploitation but also highlights the importance of timely patching to prevent future attacks. The widespread use of WordPress globally means that many organizations, especially those with multi-author blogs or content management workflows, could be affected.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade the Page Expire Popup/Redirection plugin to a patched version once available. In the absence of an official patch, administrators should consider disabling or removing the plugin to eliminate the attack surface. Implementing strict access controls to limit Author-level privileges to trusted users reduces the risk of exploitation. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'id' shortcode attribute can provide temporary protection. Additionally, auditing and monitoring database queries and logs for unusual activity may help detect exploitation attempts. Developers maintaining the plugin should refactor the code to use parameterized queries or prepared statements to properly sanitize user inputs. Regular security assessments and penetration testing focused on WordPress plugins can help identify similar vulnerabilities proactively. Finally, educating content authors about the risks of privilege misuse and enforcing strong authentication mechanisms will further reduce exposure.
Affected Countries
United States, India, Germany, United Kingdom, Canada, Australia, Brazil, France, Japan, Netherlands, Italy, Spain
CVE-2025-14153: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in vikasratudi Page Expire Popup/Redirection for WordPress
Description
The Page Expire Popup/Redirection for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the 'id' shortcode attribute in all versions up to, and including, 1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Author-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14153 identifies a time-based SQL Injection vulnerability in the Page Expire Popup/Redirection plugin for WordPress, maintained by vikasratudi. The vulnerability exists in all versions up to and including 1.0 due to insufficient escaping and lack of prepared statements when processing the 'id' shortcode attribute. Authenticated users with Author-level or higher privileges can exploit this flaw by injecting additional SQL queries into existing database commands. This injection is time-based, allowing attackers to infer sensitive information from the database by measuring response delays. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The flaw specifically affects the confidentiality of data, as attackers can extract sensitive information, but it does not affect data integrity or availability. The CVSS 3.1 score of 6.5 reflects the network attack vector, low attack complexity, required privileges, and high confidentiality impact. No patches are currently linked, and no known exploits have been reported in the wild, indicating the need for proactive mitigation. The vulnerability stems from CWE-89, which involves improper neutralization of special elements in SQL commands, a common and critical web application security issue.
Potential Impact
This vulnerability primarily threatens the confidentiality of data stored in WordPress databases using the affected plugin. Attackers with Author-level access can exploit the SQL Injection to extract sensitive information such as user credentials, personal data, or configuration details. While the vulnerability does not directly compromise data integrity or availability, the exposure of sensitive data can lead to further attacks, including privilege escalation or targeted phishing. Organizations relying on this plugin risk data breaches that can damage reputation, incur regulatory penalties, and disrupt business operations. Since the exploit requires authenticated access, the risk is somewhat mitigated by internal controls; however, compromised or malicious insiders pose a significant threat. The lack of known exploits in the wild suggests limited current exploitation but also highlights the importance of timely patching to prevent future attacks. The widespread use of WordPress globally means that many organizations, especially those with multi-author blogs or content management workflows, could be affected.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade the Page Expire Popup/Redirection plugin to a patched version once available. In the absence of an official patch, administrators should consider disabling or removing the plugin to eliminate the attack surface. Implementing strict access controls to limit Author-level privileges to trusted users reduces the risk of exploitation. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'id' shortcode attribute can provide temporary protection. Additionally, auditing and monitoring database queries and logs for unusual activity may help detect exploitation attempts. Developers maintaining the plugin should refactor the code to use parameterized queries or prepared statements to properly sanitize user inputs. Regular security assessments and penetration testing focused on WordPress plugins can help identify similar vulnerabilities proactively. Finally, educating content authors about the risks of privilege misuse and enforcing strong authentication mechanisms will further reduce exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-05T19:52:57.279Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695c838f3839e44175cef8f7
Added to database: 1/6/2026, 3:37:51 AM
Last enriched: 2/27/2026, 10:56:49 AM
Last updated: 3/24/2026, 12:41:59 AM
Views: 106
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.