CVE-2025-2890: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in TagDiv tagDiv Opt-In Builder
The tagDiv Opt-In Builder plugin for WordPress is vulnerable to time-based SQL Injection via the ‘subscriptionCouponId’ parameter in all versions up to, and including, 1.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
CVE-2025-2890 is a medium-severity SQL Injection vulnerability affecting the tagDiv Opt-In Builder plugin for WordPress, specifically all versions up to and including 1.7. The vulnerability arises from improper neutralization of special elements used in SQL commands (CWE-89) via the 'subscriptionCouponId' parameter. This parameter is insufficiently escaped and the SQL queries are not properly prepared, allowing an authenticated attacker with Subscriber-level access or higher to inject additional SQL commands. The injection is time-based, enabling attackers to extract sensitive information from the backend database by appending malicious SQL queries to legitimate ones. Notably, no user interaction is required beyond authentication, and the attack vector is remote over the network. The CVSS 3.1 base score is 6.5, reflecting a medium severity with high confidentiality impact but no integrity or availability impact. The vulnerability does not currently have known exploits in the wild, and no patches have been released yet. The attack requires at least low-level authenticated access, which means the attacker must have a valid WordPress account with subscriber or higher privileges. The plugin is widely used in WordPress sites for managing opt-in forms and marketing campaigns, making it a valuable target for attackers seeking to extract user data or other sensitive database contents. The lack of proper input sanitization and parameterized queries is the root cause, and the vulnerability specifically targets the subscriptionCouponId parameter, which is likely used in coupon or subscription management features within the plugin.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data stored in WordPress databases, including potentially personal data protected under GDPR. Since the vulnerability allows extraction of data without elevating privileges beyond subscriber-level access, attackers who compromise low-privilege accounts or exploit weak authentication mechanisms could leverage this flaw to access sensitive customer or business information. This could lead to data breaches, reputational damage, regulatory fines, and loss of customer trust. The impact is particularly critical for organizations relying heavily on WordPress for marketing, subscription management, or customer engagement, such as e-commerce, media, and service providers. The vulnerability does not affect data integrity or availability directly, but the confidentiality breach alone is sufficient to cause serious compliance and operational issues. Additionally, the lack of known exploits currently provides a window for organizations to remediate before active exploitation occurs.
Mitigation Recommendations
Immediately audit WordPress sites using the tagDiv Opt-In Builder plugin to identify affected versions (up to 1.7). Restrict subscriber-level accounts and enforce strong authentication policies, including multi-factor authentication (MFA), to reduce risk of account compromise. Implement web application firewall (WAF) rules specifically targeting SQL injection patterns related to the 'subscriptionCouponId' parameter to block malicious payloads. Employ database activity monitoring to detect unusual query patterns indicative of SQL injection attempts. Consider temporarily disabling or removing the tagDiv Opt-In Builder plugin if immediate patching is not available. Monitor vendor communications closely for patch releases and apply updates promptly once available. Review and harden WordPress user roles and permissions to minimize the number of users with subscriber or higher access. Conduct regular security assessments and penetration testing focusing on WordPress plugins to identify similar injection flaws. Educate site administrators on the risks of SQL injection and the importance of plugin updates and secure configurations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-2890: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in TagDiv tagDiv Opt-In Builder
Description
The tagDiv Opt-In Builder plugin for WordPress is vulnerable to time-based SQL Injection via the ‘subscriptionCouponId’ parameter in all versions up to, and including, 1.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Technical Analysis
CVE-2025-2890 is a medium-severity SQL Injection vulnerability affecting the tagDiv Opt-In Builder plugin for WordPress, specifically all versions up to and including 1.7. The vulnerability arises from improper neutralization of special elements used in SQL commands (CWE-89) via the 'subscriptionCouponId' parameter. This parameter is insufficiently escaped and the SQL queries are not properly prepared, allowing an authenticated attacker with Subscriber-level access or higher to inject additional SQL commands. The injection is time-based, enabling attackers to extract sensitive information from the backend database by appending malicious SQL queries to legitimate ones. Notably, no user interaction is required beyond authentication, and the attack vector is remote over the network. The CVSS 3.1 base score is 6.5, reflecting a medium severity with high confidentiality impact but no integrity or availability impact. The vulnerability does not currently have known exploits in the wild, and no patches have been released yet. The attack requires at least low-level authenticated access, which means the attacker must have a valid WordPress account with subscriber or higher privileges. The plugin is widely used in WordPress sites for managing opt-in forms and marketing campaigns, making it a valuable target for attackers seeking to extract user data or other sensitive database contents. The lack of proper input sanitization and parameterized queries is the root cause, and the vulnerability specifically targets the subscriptionCouponId parameter, which is likely used in coupon or subscription management features within the plugin.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data stored in WordPress databases, including potentially personal data protected under GDPR. Since the vulnerability allows extraction of data without elevating privileges beyond subscriber-level access, attackers who compromise low-privilege accounts or exploit weak authentication mechanisms could leverage this flaw to access sensitive customer or business information. This could lead to data breaches, reputational damage, regulatory fines, and loss of customer trust. The impact is particularly critical for organizations relying heavily on WordPress for marketing, subscription management, or customer engagement, such as e-commerce, media, and service providers. The vulnerability does not affect data integrity or availability directly, but the confidentiality breach alone is sufficient to cause serious compliance and operational issues. Additionally, the lack of known exploits currently provides a window for organizations to remediate before active exploitation occurs.
Mitigation Recommendations
Immediately audit WordPress sites using the tagDiv Opt-In Builder plugin to identify affected versions (up to 1.7). Restrict subscriber-level accounts and enforce strong authentication policies, including multi-factor authentication (MFA), to reduce risk of account compromise. Implement web application firewall (WAF) rules specifically targeting SQL injection patterns related to the 'subscriptionCouponId' parameter to block malicious payloads. Employ database activity monitoring to detect unusual query patterns indicative of SQL injection attempts. Consider temporarily disabling or removing the tagDiv Opt-In Builder plugin if immediate patching is not available. Monitor vendor communications closely for patch releases and apply updates promptly once available. Review and harden WordPress user roles and permissions to minimize the number of users with subscriber or higher access. Conduct regular security assessments and penetration testing focusing on WordPress plugins to identify similar injection flaws. Educate site administrators on the risks of SQL injection and the importance of plugin updates and secure configurations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-03-27T21:48:50.059Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbedb42
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 6/25/2025, 10:31:47 AM
Last updated: 8/16/2025, 12:28:51 PM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.