Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6986: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ninjateam FileBird – WordPress Media Library Folders & File Manager

0
Medium
VulnerabilityCVE-2025-6986cvecve-2025-6986cwe-89
Published: Wed Aug 06 2025 (08/06/2025, 01:45:13 UTC)
Source: CVE Database V5
Vendor/Project: ninjateam
Product: FileBird – WordPress Media Library Folders & File Manager

Description

The FileBird – WordPress Media Library Folders & File Manager plugin for WordPress is vulnerable to SQL Injection via the 'search' parameter in all versions up to, and including, 6.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Author-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:57:04 UTC

Technical Analysis

CVE-2025-6986 is an SQL Injection vulnerability identified in the FileBird – WordPress Media Library Folders & File Manager plugin, which is widely used to organize media files within WordPress sites. The vulnerability exists in all versions up to and including 6.4.8 and is caused by insufficient escaping and lack of proper preparation of the 'search' parameter in SQL queries. This flaw allows authenticated attackers with Author-level access or higher to append arbitrary SQL commands to existing queries. The injection occurs because user-supplied input is directly concatenated into SQL statements without adequate sanitization or use of parameterized queries. As a result, attackers can extract sensitive information from the underlying database, such as user credentials, configuration data, or other confidential content stored in the WordPress database. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality. Exploitation requires authentication but no additional user interaction, making it a significant risk for compromised or malicious insiders or attackers who have gained Author-level credentials. No public exploits or active exploitation campaigns have been reported to date. The CVSS v3.1 base score is 6.5, reflecting a medium severity due to network attack vector, low attack complexity, and partial privileges required.

Potential Impact

The primary impact of CVE-2025-6986 is unauthorized disclosure of sensitive data stored in the WordPress database. Attackers with Author-level access can leverage this vulnerability to extract confidential information, which may include user data, site configuration, or other sensitive content. This can lead to privacy violations, data breaches, and potential further compromise if sensitive credentials or tokens are exposed. Although the vulnerability does not directly affect data integrity or system availability, the confidentiality breach can have serious repercussions, including reputational damage, regulatory penalties, and loss of customer trust. Organizations relying on the FileBird plugin for media management are at risk, especially those with multiple users having Author or higher privileges. The vulnerability could also be leveraged as a stepping stone for more advanced attacks if attackers gain further access through the disclosed data. Given the widespread use of WordPress globally, the impact can be significant across various sectors including e-commerce, media, education, and government websites.

Mitigation Recommendations

To mitigate CVE-2025-6986, organizations should immediately update the FileBird plugin to a patched version once released by the vendor. Until a patch is available, administrators should restrict Author-level permissions to trusted users only and review user roles to minimize the number of users with elevated privileges. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns in the 'search' parameter can provide temporary protection. Additionally, site owners should enable database query logging and monitor for unusual query patterns indicative of injection attempts. Employing principle of least privilege for database access and isolating WordPress database users can limit the scope of data exposure. Regular backups and incident response plans should be in place to quickly recover from potential data breaches. Finally, developers should refactor the plugin code to use parameterized queries or prepared statements to prevent SQL injection vulnerabilities in future releases.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-01T20:38:33.316Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6892b7caad5a09ad00ed7e02

Added to database: 8/6/2025, 2:02:50 AM

Last enriched: 2/26/2026, 3:57:04 PM

Last updated: 3/26/2026, 11:09:20 AM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses