Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2074: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in webfactory Advanced Google reCAPTCHA

0
Medium
VulnerabilityCVE-2025-2074cvecve-2025-2074cwe-89
Published: Fri Mar 28 2025 (03/28/2025, 07:33:05 UTC)
Source: CVE Database V5
Vendor/Project: webfactory
Product: Advanced Google reCAPTCHA

Description

CVE-2025-2074 is a medium-severity SQL Injection vulnerability in the Advanced Google reCAPTCHA WordPress plugin by webfactory. It affects all versions up to 1. 29 and allows authenticated users with Subscriber-level access or higher to inject malicious SQL code via the 'sSearch' parameter. Exploitation requires that the plugin’s settings page has not been visited and its welcome message remains undismissed. The vulnerability arises from insufficient escaping and lack of prepared statements in SQL queries, enabling attackers to extract sensitive database information. No known exploits are currently reported in the wild. The CVSS score is 5. 3, reflecting network attack vector, low privileges required, and high impact on confidentiality. Organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized data disclosure. Countries with significant WordPress usage and webfactory plugin adoption are at higher risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:15:52 UTC

Technical Analysis

CVE-2025-2074 identifies a SQL Injection vulnerability in the Advanced Google reCAPTCHA plugin for WordPress, maintained by webfactory. The flaw exists in all versions up to and including 1.29 due to improper neutralization of special elements in SQL commands, specifically through the 'sSearch' parameter. This parameter is insufficiently escaped and the SQL queries are not properly prepared, allowing an authenticated attacker with Subscriber-level privileges or higher to append arbitrary SQL commands. The attack surface is limited to scenarios where the plugin’s settings page has not been accessed and the welcome message has not been dismissed, conditions that affect the plugin’s internal state and query construction. Exploiting this vulnerability enables attackers to extract sensitive information from the underlying database, compromising confidentiality without affecting integrity or availability. The vulnerability requires no user interaction but does require authentication at a low privilege level. The CVSS 3.1 vector (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates network exploitation with high attack complexity and partial confidentiality impact. No patches or known exploits are currently documented, but the risk remains significant due to the widespread use of WordPress and the plugin. The vulnerability is classified under CWE-89, a common and critical injection flaw category.

Potential Impact

The primary impact of CVE-2025-2074 is unauthorized disclosure of sensitive data from the WordPress database, which may include user credentials, personal information, or site configuration details. Since the vulnerability requires only Subscriber-level access, an attacker who gains minimal privileges—potentially through compromised accounts or weak registration controls—can leverage this flaw to escalate their knowledge of the system. This can facilitate further attacks such as privilege escalation, targeted phishing, or data exfiltration. Although the vulnerability does not directly affect data integrity or availability, the confidentiality breach can have serious consequences including regulatory non-compliance, reputational damage, and loss of user trust. Organizations running WordPress sites with this plugin, especially those handling sensitive or regulated data, face increased risk. The requirement that the plugin’s settings page remains unvisited may limit exposure but also suggests that less-maintained or less-monitored sites are more vulnerable. The lack of known exploits in the wild currently reduces immediate threat but does not eliminate future risk.

Mitigation Recommendations

To mitigate CVE-2025-2074, organizations should immediately verify if they are running the Advanced Google reCAPTCHA plugin version 1.29 or earlier and upgrade to a patched version once released by webfactory. In the absence of an official patch, administrators should consider temporarily disabling the plugin or restricting access to the WordPress dashboard to trusted users only. Additionally, dismissing the plugin’s welcome message and visiting the settings page may alter the plugin state to prevent exploitation, serving as a temporary workaround. Implementing Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'sSearch' parameter can provide additional protection. Monitoring user accounts for unusual Subscriber-level activity and enforcing strong authentication controls will reduce the risk of attacker access. Regularly auditing plugin usage and applying the principle of least privilege to WordPress roles will further limit exposure. Finally, maintaining comprehensive backups and monitoring logs for anomalous database queries can aid in early detection and recovery.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-03-06T20:49:38.920Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b1db7ef31ef0b54e408

Added to database: 2/25/2026, 9:35:25 PM

Last enriched: 2/25/2026, 10:15:52 PM

Last updated: 2/26/2026, 8:30:42 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats