Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14770: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in tridenttechnolabs Shipping Rate By Cities

0
High
VulnerabilityCVE-2025-14770cvecve-2025-14770cwe-89
Published: Wed Jan 14 2026 (01/14/2026, 06:40:04 UTC)
Source: CVE Database V5
Vendor/Project: tridenttechnolabs
Product: Shipping Rate By Cities

Description

The Shipping Rate By Cities plugin for WordPress is vulnerable to SQL Injection via the 'city' parameter in all versions up to, and including, 2.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 01/14/2026, 07:17:08 UTC

Technical Analysis

CVE-2025-14770 is an SQL Injection vulnerability identified in the 'Shipping Rate By Cities' WordPress plugin developed by tridenttechnolabs. The vulnerability exists in all versions up to and including 2.0.0 due to improper neutralization of special elements in the 'city' parameter used in SQL queries. Specifically, the plugin fails to properly escape or prepare the SQL statements, allowing unauthenticated attackers to inject arbitrary SQL commands. This injection can be performed remotely over the network without any authentication or user interaction, making exploitation straightforward. The vulnerability allows attackers to append additional SQL queries to the existing ones, potentially enabling unauthorized extraction of sensitive information from the backend database, such as customer data, shipping rates, or other confidential information stored within the WordPress database. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed, with a significant impact on confidentiality but no impact on integrity or availability. No patches or fixes are currently published, and no known exploits have been observed in the wild as of the publication date. The vulnerability is tracked under CWE-89, which covers improper neutralization of special elements used in SQL commands. Organizations using this plugin should be aware of the risk of data leakage and take immediate steps to mitigate the threat.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those operating e-commerce platforms or websites that rely on the 'Shipping Rate By Cities' plugin for calculating shipping costs. Successful exploitation can lead to unauthorized disclosure of sensitive customer information, including personal data and shipping details, which can violate GDPR and other data protection regulations, potentially resulting in legal penalties and reputational damage. The breach of confidentiality can also facilitate further attacks, such as identity theft or targeted phishing campaigns. Although the vulnerability does not directly affect data integrity or availability, the loss of sensitive data alone can have severe consequences. Additionally, organizations may face operational disruptions if they need to take affected systems offline to remediate the vulnerability. The ease of exploitation without authentication increases the risk of automated attacks and mass scanning by threat actors. Given the widespread use of WordPress in Europe and the popularity of shipping-related plugins, many small to medium-sized enterprises (SMEs) and larger retailers could be exposed, amplifying the overall risk landscape.

Mitigation Recommendations

Immediate mitigation should focus on monitoring for updates or patches from tridenttechnolabs and applying them as soon as they become available. Until a patch is released, organizations should implement Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'city' parameter in HTTP requests. Input validation and sanitization can be enforced at the application or server level to reject suspicious input patterns. Additionally, database permissions should be reviewed and minimized to limit the potential impact of any injection attack, ensuring that the WordPress database user has only necessary privileges. Regular security audits and vulnerability scans should be conducted to detect exploitation attempts. Organizations should also ensure that backups are current and securely stored to enable recovery in case of data compromise. Finally, educating development and security teams about secure coding practices and the risks of SQL injection can help prevent similar vulnerabilities in the future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-16T02:16:23.048Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69673f948330e06716b84f7c

Added to database: 1/14/2026, 7:02:44 AM

Last enriched: 1/14/2026, 7:17:08 AM

Last updated: 1/14/2026, 6:30:59 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats