Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30788: Cross-Site Request Forgery (CSRF) in Eli EZ SQL Reports Shortcode Widget and DB Backup

0
Unknown
VulnerabilityCVE-2025-30788cvecve-2025-30788
Published: Thu Mar 27 2025 (03/27/2025, 10:54:48 UTC)
Source: CVE Database V5
Vendor/Project: Eli
Product: EZ SQL Reports Shortcode Widget and DB Backup

Description

Cross-Site Request Forgery (CSRF) vulnerability in Eli EZ SQL Reports Shortcode Widget and DB Backup elisqlreports allows SQL Injection.This issue affects EZ SQL Reports Shortcode Widget and DB Backup: from n/a through <= 5.25.08.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 00:16:01 UTC

Technical Analysis

CVE-2025-30788 identifies a critical security vulnerability in the Eli EZ SQL Reports Shortcode Widget and DB Backup plugin, specifically versions up to and including 5.25.08. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that enables attackers to perform SQL Injection attacks. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unauthorized requests to a web application. In this case, the plugin fails to properly verify the authenticity of requests, allowing malicious actors to craft requests that execute arbitrary SQL commands on the backend database. This can lead to unauthorized data access, data modification, or even full database compromise. The vulnerability affects the plugin’s shortcode widget and database backup functionalities, which are commonly used features in WordPress environments for reporting and data management. Although no public exploits have been reported yet, the combination of CSRF and SQL Injection is particularly dangerous because it can bypass many traditional security controls and does not require direct user interaction beyond visiting a malicious webpage. The lack of a CVSS score suggests this is a newly disclosed issue, but the technical details and potential impact indicate a high severity level. The vulnerability was reserved and published in late March 2025 by Patchstack, a known vulnerability tracking entity. No official patches or mitigation links are currently provided, indicating that users must rely on interim protective measures until an official update is released.

Potential Impact

The impact of this vulnerability is significant for organizations using the Eli EZ SQL Reports Shortcode Widget and DB Backup plugin. Successful exploitation can lead to unauthorized SQL Injection attacks, which may result in data leakage, data corruption, or complete database compromise. This threatens the confidentiality, integrity, and availability of critical business data. Attackers could extract sensitive information such as user credentials, financial records, or proprietary data. They might also alter or delete data, disrupting business operations and causing reputational damage. Since the vulnerability exploits CSRF, it can be triggered by an authenticated user visiting a malicious website, increasing the risk of widespread exploitation. Organizations relying on this plugin for reporting or backup functions face elevated risks of data breaches and operational interruptions. The absence of known exploits in the wild provides a limited window for remediation, but the potential for damage is high if attackers develop weaponized exploits. This vulnerability is particularly impactful for websites with high traffic or those handling sensitive information, including e-commerce, finance, healthcare, and government sectors.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if they are using the affected versions of the Eli EZ SQL Reports Shortcode Widget and DB Backup plugin (versions up to 5.25.08). If so, immediate steps include disabling or uninstalling the plugin until a security patch is released. Implementing a Web Application Firewall (WAF) with custom rules to detect and block suspicious CSRF and SQL Injection attempts can provide interim protection. Enforcing strict SameSite cookie attributes and CSRF tokens in web applications can reduce the risk of CSRF exploitation. Monitoring database logs for unusual queries or unauthorized access attempts is critical to detect potential exploitation early. Organizations should also review user permissions to minimize the number of users with database modification rights. Regular backups should be maintained and tested to ensure recovery capability in case of data compromise. Finally, stay informed through vendor advisories and Patchstack updates for official patches or security fixes and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-03-26T09:20:11.232Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7310e6bfc5ba1def05d5

Added to database: 4/1/2026, 7:33:36 PM

Last enriched: 4/2/2026, 12:16:01 AM

Last updated: 4/6/2026, 9:13:08 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses