Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30628: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in AA-Team Amazon Affiliates Addon for WPBakery Page Builder (formerly Visual Composer)

0
High
VulnerabilityCVE-2025-30628cvecve-2025-30628cwe-89
Published: Wed Dec 31 2025 (12/31/2025, 20:03:50 UTC)
Source: CVE Database V5
Vendor/Project: AA-Team
Product: Amazon Affiliates Addon for WPBakery Page Builder (formerly Visual Composer)

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AA-Team Amazon Affiliates Addon for WPBakery Page Builder (formerly Visual Composer) allows SQL Injection.This issue affects Amazon Affiliates Addon for WPBakery Page Builder (formerly Visual Composer): from n/a through 1.2.

AI-Powered Analysis

AILast updated: 01/07/2026, 23:19:54 UTC

Technical Analysis

CVE-2025-30628 is a vulnerability classified under CWE-89, indicating an SQL Injection flaw in the AA-Team Amazon Affiliates Addon for WPBakery Page Builder, a popular WordPress page builder plugin formerly known as Visual Composer. The vulnerability stems from improper neutralization of special elements used in SQL commands, allowing attackers to inject malicious SQL code. This can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), requiring only low privileges (PR:L) and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The CVSS 3.1 base score is 8.5 (high severity), reflecting a high impact on confidentiality (C:H), no impact on integrity (I:N), and low impact on availability (A:L). The vulnerability affects versions up to 1.2 of the addon, though exact affected versions are not fully enumerated. Exploitation could allow an attacker to extract sensitive data from the backend database, potentially exposing user information, affiliate credentials, or other confidential data stored within the WordPress environment. No public exploits have been reported yet, but the vulnerability's characteristics suggest it could be weaponized easily once a proof of concept is developed. The vulnerability was reserved in March 2025 and published at the end of 2025, indicating recent discovery and disclosure. The lack of available patches at the time of reporting necessitates immediate defensive measures. Given the widespread use of WordPress and its plugins across Europe, this vulnerability poses a significant risk to organizations relying on this addon for affiliate marketing and e-commerce functionalities.

Potential Impact

For European organizations, the impact of CVE-2025-30628 can be substantial. The vulnerability allows attackers to perform unauthorized SQL queries, leading to the exposure of sensitive data such as user credentials, affiliate tracking information, and potentially payment or personal data stored within the WordPress database. This compromises confidentiality and could lead to data breaches subject to GDPR penalties. The partial availability impact may cause service disruptions or degraded performance, affecting user experience and business operations. Organizations involved in affiliate marketing or e-commerce are particularly vulnerable, as attackers could manipulate affiliate data or extract competitive intelligence. The exploitation requires only low privileges, meaning even compromised or low-level accounts could be leveraged to escalate attacks. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score and ease of exploitation underscore the urgency. Failure to address this vulnerability could result in reputational damage, regulatory fines, and financial losses for European entities.

Mitigation Recommendations

1. Monitor the AA-Team vendor channels and trusted security advisories for official patches or updates addressing CVE-2025-30628 and apply them immediately upon release. 2. Until patches are available, restrict access to the WordPress admin panel and plugin management interfaces to trusted personnel only, minimizing the risk of low-privilege exploitation. 3. Implement a Web Application Firewall (WAF) with specific SQL Injection detection and prevention rules tailored to WordPress environments and the affected plugin's typical SQL patterns. 4. Conduct regular security audits and code reviews of the Amazon Affiliates Addon if custom modifications exist, ensuring no additional injection vectors are present. 5. Employ database user privilege restrictions, ensuring the WordPress database user has only the minimum necessary permissions to limit the impact of any successful injection. 6. Enable detailed logging and monitoring for unusual database queries or access patterns to detect potential exploitation attempts early. 7. Educate site administrators and developers about the risks of SQL Injection and the importance of input validation and sanitization in plugin usage. 8. Consider temporarily disabling or replacing the vulnerable addon with alternative affiliate marketing solutions until a secure version is confirmed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-03-24T13:00:55.839Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69558402db813ff03efee307

Added to database: 12/31/2025, 8:13:54 PM

Last enriched: 1/7/2026, 11:19:54 PM

Last updated: 1/8/2026, 7:25:07 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats