Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8994: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wedevs Project Management & Task Manager with Kanban Board & Gantt Chart – WP Project Manager

0
Medium
VulnerabilityCVE-2025-8994cvecve-2025-8994cwe-89
Published: Sat Nov 15 2025 (11/15/2025, 05:45:33 UTC)
Source: CVE Database V5
Vendor/Project: wedevs
Product: Project Management & Task Manager with Kanban Board & Gantt Chart – WP Project Manager

Description

The Project Management, Team Collaboration, Kanban Board, Gantt Charts, Task Manager and More – WP Project Manager plugin for WordPress is vulnerable to time-based SQL Injection via the ‘completed_at_operator’ parameter in all versions up to, and including, 2.6.26 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 11/29/2025, 08:55:27 UTC

Technical Analysis

CVE-2025-8994 is a time-based SQL Injection vulnerability identified in the WP Project Manager plugin for WordPress, specifically in versions up to and including 2.6.26. The vulnerability stems from improper neutralization of special characters in the 'completed_at_operator' parameter, which is used in SQL queries without sufficient escaping or parameterization. This flaw allows authenticated users with Subscriber-level privileges or higher to inject malicious SQL code into existing queries. The injection is time-based, meaning attackers can infer data by measuring response delays, enabling extraction of sensitive information from the underlying database. The vulnerability affects the confidentiality of data but does not impact integrity or availability. Exploitation requires authentication but no additional user interaction, making it a significant risk in environments where low-privilege users have access. The CVSS 3.1 score of 6.5 reflects medium severity, with network attack vector, low attack complexity, and partial confidentiality impact. No patches are currently linked, and no known exploits have been reported in the wild, but the risk remains due to the widespread use of WordPress and this plugin for project management tasks. The vulnerability is classified under CWE-89, indicating improper neutralization of special elements in SQL commands.

Potential Impact

For European organizations, this vulnerability poses a notable risk to the confidentiality of sensitive project management data stored within WordPress environments using the affected plugin. Attackers with minimal privileges can extract confidential information such as project details, user data, or internal notes, potentially leading to data breaches or leakage of intellectual property. This can undermine trust, cause regulatory compliance issues under GDPR, and damage organizational reputation. Since the vulnerability does not affect data integrity or availability, operational disruption is less likely, but the exposure of sensitive data alone can have severe consequences. Organizations relying heavily on collaborative project management tools integrated with WordPress are particularly vulnerable. The risk is amplified in sectors with strict data protection requirements, such as finance, healthcare, and government entities across Europe.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the affected plugin features to trusted users only and monitoring for unusual database query patterns indicative of SQL injection attempts. Organizations should implement Web Application Firewalls (WAFs) with custom rules to detect and block exploitation attempts targeting the 'completed_at_operator' parameter. Until an official patch is released, administrators can apply manual input validation and sanitization on the parameter, ensuring only expected operators are accepted. Employing parameterized queries or prepared statements in custom code interfacing with the plugin can reduce risk. Regularly auditing user privileges to minimize Subscriber-level access where not necessary will limit the attack surface. Additionally, organizations should maintain up-to-date backups and monitor logs for suspicious activity. Once a vendor patch is available, prompt application is critical. Security teams should also educate users about the risks of SQL injection and enforce strong authentication controls to prevent unauthorized access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-08-13T17:15:06.350Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6918143b93cc35e7aa3af0f3

Added to database: 11/15/2025, 5:48:43 AM

Last enriched: 11/29/2025, 8:55:27 AM

Last updated: 1/7/2026, 3:54:42 AM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats