Skip to main content

CVE-2025-7662: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in evigeo Gestion de tarifs

Medium
VulnerabilityCVE-2025-7662cvecve-2025-7662cwe-89
Published: Fri Aug 15 2025 (08/15/2025, 08:25:41 UTC)
Source: CVE Database V5
Vendor/Project: evigeo
Product: Gestion de tarifs

Description

The Gestion de tarifs plugin for WordPress is vulnerable to SQL Injection via the 'tarif' and 'intitule' shortcodes in all versions up to, and including, 1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 08/15/2025, 09:05:48 UTC

Technical Analysis

CVE-2025-7662 is a medium-severity SQL Injection vulnerability affecting the 'Gestion de tarifs' plugin for WordPress, developed by evigeo. This vulnerability exists in all versions up to and including 1.4 of the plugin. The flaw arises from improper neutralization of special elements in SQL commands (CWE-89), specifically due to insufficient escaping of user-supplied parameters in the 'tarif' and 'intitule' shortcodes. Authenticated attackers with Contributor-level access or higher can exploit this vulnerability by injecting additional SQL queries into existing database queries. This can lead to unauthorized extraction of sensitive information from the backend database. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L), but requires privileges equivalent to Contributor role (PR:L). The impact is primarily on confidentiality (C:H), with no direct impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The CVSS v3.1 base score is 6.5, reflecting a medium severity level. The vulnerability is significant because WordPress is widely used across many organizations, and plugins like Gestion de tarifs are often used for pricing management, which may contain sensitive commercial data. The lack of proper input sanitization and parameterized queries in the plugin's codebase is the root cause, making it vulnerable to SQL injection attacks that can bypass normal access controls to extract data from the database.

Potential Impact

For European organizations using WordPress sites with the Gestion de tarifs plugin, this vulnerability poses a risk of sensitive data leakage, including pricing information or other confidential business data stored in the database. Since exploitation requires Contributor-level access, attackers may first need to compromise or create an account with such privileges, which could be feasible through phishing or other social engineering attacks. Once exploited, attackers can extract data without altering or disrupting the service, making detection difficult. This can lead to competitive disadvantage, regulatory compliance issues (e.g., GDPR violations if personal data is exposed), and reputational damage. The risk is heightened for e-commerce, financial, or governmental organizations that rely on accurate tariff management. The vulnerability does not directly impact system availability or data integrity, but the confidentiality breach alone can have serious consequences. Given the widespread use of WordPress in Europe and the potential for targeted attacks against organizations managing pricing data, the threat is relevant and should be addressed promptly.

Mitigation Recommendations

1. Immediate mitigation involves upgrading the Gestion de tarifs plugin to a version that addresses this vulnerability once available. Since no patch links are currently provided, organizations should monitor vendor announcements closely. 2. As a temporary measure, restrict Contributor-level access strictly to trusted users and review existing user roles to minimize exposure. 3. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'tarif' and 'intitule' shortcode parameters. 4. Conduct code audits and apply manual input validation and parameterized queries in the plugin code if possible, especially escaping or sanitizing inputs before they reach SQL queries. 5. Enable detailed logging and monitoring of database queries and user activities to detect unusual access patterns or data extraction attempts. 6. Regularly back up databases and ensure incident response plans are in place to quickly respond to any breach. 7. Educate site administrators and users about the risks of privilege escalation and enforce strong authentication mechanisms to prevent unauthorized access to Contributor accounts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-14T20:42:50.678Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689ef436ad5a09ad0069733d

Added to database: 8/15/2025, 8:47:50 AM

Last enriched: 8/15/2025, 9:05:48 AM

Last updated: 8/23/2025, 7:51:51 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats