Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25151: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Stylemix uListing

0
Unknown
VulnerabilityCVE-2025-25151cvecve-2025-25151
Published: Fri Feb 07 2025 (02/07/2025, 10:11:55 UTC)
Source: CVE Database V5
Vendor/Project: Stylemix
Product: uListing

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Stylemix uListing ulisting allows SQL Injection.This issue affects uListing: from n/a through <= 2.1.6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 22:03:06 UTC

Technical Analysis

CVE-2025-25151 is an SQL Injection vulnerability discovered in the Stylemix uListing WordPress plugin, affecting all versions up to and including 2.1.6. The vulnerability arises from improper neutralization of special characters in SQL commands, allowing attackers to craft malicious input that alters the intended SQL query logic. This can lead to unauthorized database queries, enabling attackers to read, modify, or delete sensitive data stored in the backend database. The vulnerability is typical of insufficient input sanitization or parameterization in database queries. Although no public exploits have been reported yet, the nature of SQL Injection makes it a critical risk, especially for websites relying on uListing for listing management, such as real estate or directory services. The plugin’s popularity in WordPress ecosystems increases the attack surface. The lack of an official patch at the time of disclosure means users must rely on temporary mitigations. The vulnerability does not require authentication or user interaction, increasing its exploitability. The absence of a CVSS score necessitates an expert severity assessment based on impact and exploitability factors.

Potential Impact

The impact of this SQL Injection vulnerability is significant for organizations using the Stylemix uListing plugin. Successful exploitation can lead to unauthorized disclosure of sensitive information, including user data and business-critical listings. Attackers may also manipulate or delete database records, disrupting service availability and data integrity. This can result in reputational damage, regulatory non-compliance, and financial losses. Since uListing is used primarily in WordPress environments, which are common worldwide, the scope of affected systems is broad. The vulnerability’s ease of exploitation without authentication or user interaction increases the risk of automated attacks and mass exploitation campaigns. Organizations with publicly accessible uListing installations are particularly vulnerable to data breaches and potential lateral movement within their networks if database credentials are compromised.

Mitigation Recommendations

To mitigate CVE-2025-25151, organizations should immediately monitor for updates from Stylemix and apply official patches once released. Until patches are available, implement strict input validation and sanitization on all user-supplied data interacting with the uListing plugin. Employ Web Application Firewalls (WAFs) with SQL Injection detection and prevention rules tailored to block malicious payloads targeting uListing endpoints. Restrict database user permissions to the minimum necessary, avoiding elevated privileges that could exacerbate damage if exploited. Conduct regular security audits and vulnerability scans focusing on WordPress plugins. Consider isolating the database server from direct internet access and enabling logging and alerting for suspicious database queries. Educate administrators on the risks of SQL Injection and the importance of timely patching. Finally, maintain regular backups of website and database content to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-02-03T13:35:19.028Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7293e6bfc5ba1deeae8a

Added to database: 4/1/2026, 7:31:31 PM

Last enriched: 4/1/2026, 10:03:06 PM

Last updated: 4/4/2026, 8:19:10 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses