Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5487: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in rubengc AutomatorWP – Automator plugin for no-code automations, webhooks & custom integrations in WordPress

0
High
VulnerabilityCVE-2025-5487cvecve-2025-5487cwe-89
Published: Sat Jun 14 2025 (06/14/2025, 06:41:27 UTC)
Source: CVE Database V5
Vendor/Project: rubengc
Product: AutomatorWP – Automator plugin for no-code automations, webhooks & custom integrations in WordPress

Description

The AutomatorWP – Automator plugin for no-code automations, webhooks & custom integrations in WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the field_conditions parameter in all versions up to, and including, 5.2.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Administrators can configure the plugin to allow access to this functionality to authors and higher.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:20:02 UTC

Technical Analysis

CVE-2025-5487 is a time-based SQL Injection vulnerability classified under CWE-89, found in the AutomatorWP – Automator plugin for WordPress, which facilitates no-code automations, webhooks, and custom integrations. The vulnerability exists in all plugin versions up to and including 5.2.3 due to insufficient escaping and lack of proper preparation of the 'field_conditions' parameter in SQL queries. Authenticated attackers with Administrator-level privileges or higher can exploit this flaw by injecting additional SQL commands into existing queries, enabling unauthorized extraction, modification, or deletion of sensitive data stored in the WordPress database. The plugin’s configuration may allow authors or higher roles to access the vulnerable functionality, broadening the potential attacker base. The vulnerability does not require user interaction but does require elevated privileges, making it a high-risk issue. Although no known exploits have been observed in the wild, the vulnerability’s CVSS score of 7.2 reflects its significant impact on confidentiality, integrity, and availability. The root cause is improper neutralization of special elements in SQL commands, a common and dangerous flaw that can lead to severe data breaches and system compromise. The plugin is widely used in WordPress environments, which are prevalent globally, increasing the scope of potential impact. The vulnerability was publicly disclosed in June 2025, and no official patches have been linked yet, necessitating immediate attention from administrators.

Potential Impact

The SQL Injection vulnerability in AutomatorWP can lead to severe consequences for affected organizations. Attackers with administrator or elevated privileges can extract sensitive information such as user credentials, personal data, or business-critical information from the WordPress database. They can also modify or delete data, potentially disrupting business operations or corrupting data integrity. Since WordPress powers a significant portion of websites worldwide, including e-commerce, government, and enterprise sites, the impact can be widespread. Exploitation could facilitate further attacks such as privilege escalation, persistent backdoors, or lateral movement within networks. The vulnerability undermines the confidentiality, integrity, and availability of affected systems, potentially leading to data breaches, regulatory non-compliance, reputational damage, and financial losses. Organizations that allow authors or lower privileged users to access the vulnerable functionality face increased risk. The lack of known exploits in the wild currently limits immediate widespread damage, but the vulnerability’s presence in a popular plugin makes it a likely target for future attacks.

Mitigation Recommendations

To mitigate CVE-2025-5487, organizations should immediately review and restrict access to the AutomatorWP plugin’s functionality, ensuring only trusted administrators have permissions to use features involving the 'field_conditions' parameter. Disable or limit the plugin’s use where possible until a security patch is released. Monitor database logs and query patterns for unusual or unexpected SQL commands that may indicate exploitation attempts. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL Injection payloads targeting the plugin’s parameters. Conduct thorough audits of user roles and permissions in WordPress to minimize the number of users with elevated privileges. Backup WordPress databases regularly and maintain offline copies to enable recovery in case of data corruption or deletion. Stay alert for official patches or updates from the plugin vendor and apply them promptly once available. Consider using security plugins that provide additional SQL Injection protection and hardening measures. Finally, educate administrators and developers about secure coding practices and the risks of SQL Injection to prevent similar vulnerabilities in custom integrations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-02T21:03:40.322Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684d1b74a8c92127438178c1

Added to database: 6/14/2025, 6:49:24 AM

Last enriched: 2/27/2026, 3:20:02 PM

Last updated: 3/24/2026, 3:06:40 AM

Views: 271

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses