Skip to main content

CVE-2025-2011: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in averta Popup and Slider Builder by Depicter – Add Email collecting Popup, Popup Modal, Coupon Popup, Image Slider, Carousel Slider, Post Slider Carousel

High
VulnerabilityCVE-2025-2011cvecve-2025-2011cwe-89
Published: Tue May 06 2025 (05/06/2025, 09:21:49 UTC)
Source: CVE
Vendor/Project: averta
Product: Popup and Slider Builder by Depicter – Add Email collecting Popup, Popup Modal, Coupon Popup, Image Slider, Carousel Slider, Post Slider Carousel

Description

The Slider & Popup Builder by Depicter plugin for WordPress is vulnerable to generic SQL Injection via the ‘s' parameter in all versions up to, and including, 3.6.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 07/05/2025, 14:55:54 UTC

Technical Analysis

CVE-2025-2011 is a high-severity SQL Injection vulnerability (CWE-89) affecting the Slider & Popup Builder plugin by Depicter for WordPress, which is used to create various interactive elements such as email collecting popups, coupon popups, image sliders, and carousels. The vulnerability exists in all versions up to and including 3.6.1. It arises from improper neutralization of special elements in the 's' parameter, which is user-supplied and insufficiently escaped before being incorporated into SQL queries. This lack of proper input sanitization and query preparation allows unauthenticated attackers to inject arbitrary SQL commands into the database queries executed by the plugin. Exploitation does not require authentication or user interaction and can be performed remotely over the network. The vulnerability can be leveraged to extract sensitive information from the backend database, potentially including user data, credentials, or other confidential content stored within the WordPress environment. The CVSS 3.1 base score is 7.5, reflecting high severity due to the ease of exploitation (network vector, no privileges or user interaction required) and the high impact on confidentiality. Integrity and availability impacts are not indicated. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in early March 2025 and published in May 2025, with enrichment from CISA and Wordfence, indicating credible and verified reporting.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress websites that utilize the affected Slider & Popup Builder plugin. Successful exploitation could lead to unauthorized disclosure of sensitive customer data, internal business information, or credentials stored in the WordPress database. This could result in data breaches subject to GDPR regulations, leading to legal penalties and reputational damage. E-commerce sites using coupon popups or email collection features are particularly at risk, as attackers could extract customer emails and other personal data. The vulnerability's unauthenticated nature means attackers can scan and exploit vulnerable sites en masse, increasing the likelihood of widespread compromise. Additionally, the extracted data could be used for further phishing or social engineering attacks targeting European users. While the vulnerability does not directly affect data integrity or availability, the confidentiality breach alone is critical under European data protection laws and cybersecurity frameworks.

Mitigation Recommendations

European organizations should immediately identify if their WordPress installations use the Slider & Popup Builder by Depicter plugin, particularly versions up to 3.6.1. Since no official patches are currently linked, organizations should consider the following specific mitigations: 1) Temporarily disable or uninstall the vulnerable plugin until a patch is released. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection payloads targeting the 's' parameter, focusing on common SQL injection patterns. 3) Employ strict input validation and sanitization at the web server or application firewall level to filter out malicious input before it reaches the plugin. 4) Monitor web server and database logs for unusual query patterns or repeated failed attempts indicative of SQL injection exploitation. 5) Restrict database user permissions for the WordPress application to the minimum necessary, limiting the potential data exposure if exploited. 6) Prepare for rapid deployment of patches once available and test updates in staging environments before production rollout. 7) Educate site administrators about the risks and signs of exploitation to enable prompt incident response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-03-05T22:04:20.390Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9b48

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 2:55:54 PM

Last updated: 8/10/2025, 10:24:13 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats