CVE-2025-4396: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Relevanssi Relevanssi – A Better Search (Pro)
The Relevanssi – A Better Search plugin for WordPress is vulnerable to time-based SQL Injection via the cats and tags query parameters in all versions up to, and including, 4.24.4 (Free) and <= 2.27.4 (Premium) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries to already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
CVE-2025-4396 is a high-severity SQL Injection vulnerability affecting the Relevanssi – A Better Search plugin for WordPress, including both the Free version up to 4.24.4 and the Premium version up to 2.27.4. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89), specifically through the 'cats' and 'tags' query parameters. These parameters are insufficiently escaped and the underlying SQL queries are not properly prepared, allowing unauthenticated attackers to inject malicious SQL code. This injection is time-based, meaning attackers can infer data by measuring response delays, enabling extraction of sensitive database information without direct error messages. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS v3.1 score is 7.5, reflecting high impact on confidentiality with no impact on integrity or availability. Although no known exploits are currently reported in the wild, the ease of exploitation and the widespread use of WordPress and Relevanssi make this a significant threat. The plugin’s role in enhancing WordPress search functionality means that many websites, including those of European organizations, could be affected if they use vulnerable versions. Attackers could leverage this flaw to extract sensitive data such as user credentials, internal content, or configuration details, potentially leading to further compromise or data breaches.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Many European companies and institutions rely on WordPress for their websites and intranets, and Relevanssi is a popular plugin to improve search capabilities. Exploitation could lead to unauthorized disclosure of sensitive information stored in the WordPress database, including personal data protected under GDPR. This could result in regulatory penalties, reputational damage, and loss of customer trust. Additionally, extracted data might be used to facilitate further attacks such as privilege escalation or lateral movement within networks. Given the unauthenticated nature of the exploit, attackers can target publicly accessible websites without needing credentials, increasing the risk of widespread exploitation. The time-based nature of the injection may allow attackers to remain stealthy, complicating detection efforts. Organizations in sectors with high data sensitivity, such as finance, healthcare, and government, are particularly at risk due to the potential exposure of confidential information.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately update the Relevanssi plugin to a patched version once available. In the absence of an official patch, organizations can implement temporary mitigations such as deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'cats' and 'tags' parameters. Reviewing and restricting access to the affected endpoints can reduce exposure. Additionally, organizations should audit their WordPress installations to identify all instances of the Relevanssi plugin and verify versions. Employing database activity monitoring can help detect suspicious queries indicative of exploitation attempts. It is also advisable to enforce the principle of least privilege on database accounts used by WordPress to limit the impact of any successful injection. Regular backups and incident response plans should be updated to prepare for potential data breaches. Finally, organizations should monitor threat intelligence feeds for any emerging exploits related to CVE-2025-4396.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-4396: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Relevanssi Relevanssi – A Better Search (Pro)
Description
The Relevanssi – A Better Search plugin for WordPress is vulnerable to time-based SQL Injection via the cats and tags query parameters in all versions up to, and including, 4.24.4 (Free) and <= 2.27.4 (Premium) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries to already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Technical Analysis
CVE-2025-4396 is a high-severity SQL Injection vulnerability affecting the Relevanssi – A Better Search plugin for WordPress, including both the Free version up to 4.24.4 and the Premium version up to 2.27.4. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89), specifically through the 'cats' and 'tags' query parameters. These parameters are insufficiently escaped and the underlying SQL queries are not properly prepared, allowing unauthenticated attackers to inject malicious SQL code. This injection is time-based, meaning attackers can infer data by measuring response delays, enabling extraction of sensitive database information without direct error messages. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS v3.1 score is 7.5, reflecting high impact on confidentiality with no impact on integrity or availability. Although no known exploits are currently reported in the wild, the ease of exploitation and the widespread use of WordPress and Relevanssi make this a significant threat. The plugin’s role in enhancing WordPress search functionality means that many websites, including those of European organizations, could be affected if they use vulnerable versions. Attackers could leverage this flaw to extract sensitive data such as user credentials, internal content, or configuration details, potentially leading to further compromise or data breaches.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Many European companies and institutions rely on WordPress for their websites and intranets, and Relevanssi is a popular plugin to improve search capabilities. Exploitation could lead to unauthorized disclosure of sensitive information stored in the WordPress database, including personal data protected under GDPR. This could result in regulatory penalties, reputational damage, and loss of customer trust. Additionally, extracted data might be used to facilitate further attacks such as privilege escalation or lateral movement within networks. Given the unauthenticated nature of the exploit, attackers can target publicly accessible websites without needing credentials, increasing the risk of widespread exploitation. The time-based nature of the injection may allow attackers to remain stealthy, complicating detection efforts. Organizations in sectors with high data sensitivity, such as finance, healthcare, and government, are particularly at risk due to the potential exposure of confidential information.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately update the Relevanssi plugin to a patched version once available. In the absence of an official patch, organizations can implement temporary mitigations such as deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'cats' and 'tags' parameters. Reviewing and restricting access to the affected endpoints can reduce exposure. Additionally, organizations should audit their WordPress installations to identify all instances of the Relevanssi plugin and verify versions. Employing database activity monitoring can help detect suspicious queries indicative of exploitation attempts. It is also advisable to enforce the principle of least privilege on database accounts used by WordPress to limit the impact of any successful injection. Regular backups and incident response plans should be updated to prepare for potential data breaches. Finally, organizations should monitor threat intelligence feeds for any emerging exploits related to CVE-2025-4396.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-06T20:10:28.220Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6565
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 2:01:26 AM
Last updated: 8/14/2025, 6:54:00 PM
Views: 10
Related Threats
Top Israeli Cybersecurity Director Arrested in US Child Exploitation Sting
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.