Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9322: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in themeisle Stripe Payment Forms by WP Full Pay – Accept Credit Card Payments, Donations & Subscriptions

0
High
VulnerabilityCVE-2025-9322cvecve-2025-9322cwe-89
Published: Sat Oct 25 2025 (10/25/2025, 06:49:23 UTC)
Source: CVE Database V5
Vendor/Project: themeisle
Product: Stripe Payment Forms by WP Full Pay – Accept Credit Card Payments, Donations & Subscriptions

Description

The Stripe Payment Forms by WP Full Pay – Accept Credit Card Payments, Donations & Subscriptions plugin for WordPress is vulnerable to SQL Injection via the 'wpfs-form-name' parameter in all versions up to, and including, 8.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 11/01/2025, 07:21:18 UTC

Technical Analysis

CVE-2025-9322 identifies a critical SQL Injection vulnerability in the 'Stripe Payment Forms by WP Full Pay – Accept Credit Card Payments, Donations & Subscriptions' WordPress plugin, maintained by themeisle. The vulnerability exists in all versions up to and including 8.3.1 due to insufficient escaping and lack of prepared statements when handling the 'wpfs-form-name' parameter. This parameter is user-supplied and directly incorporated into SQL queries without proper sanitization, enabling attackers to append arbitrary SQL commands. The vulnerability is remotely exploitable over the network without any authentication or user interaction, increasing its risk profile. Successful exploitation allows attackers to extract sensitive information from the backend database, such as payment details, user data, or other confidential records stored by the plugin or WordPress site. Although no public exploits have been reported yet, the vulnerability's characteristics—network accessibility, no authentication required, and high confidentiality impact—make it a prime target for attackers. The CVSS 3.1 base score of 7.5 reflects these factors, with a vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). This vulnerability falls under CWE-89, which covers improper neutralization of special elements in SQL commands. The plugin is widely used for processing payments, donations, and subscriptions via Stripe on WordPress sites, making the vulnerability relevant to many e-commerce and fundraising platforms.

Potential Impact

For European organizations, this vulnerability poses a significant risk of unauthorized data disclosure, particularly sensitive payment and personal information processed through the affected WordPress plugin. Exploitation could lead to breaches of GDPR and other data protection regulations, resulting in legal penalties and reputational damage. Organizations relying on this plugin for online payments or donations may experience loss of customer trust and potential financial fraud. Since the vulnerability does not affect integrity or availability directly, attackers are primarily focused on data exfiltration. However, the exposure of payment data can facilitate further attacks such as identity theft or financial fraud. The ease of exploitation without authentication increases the likelihood of automated scanning and exploitation attempts, especially targeting European e-commerce and non-profit sectors. Additionally, compromised sites may be used as pivot points for further attacks within organizational networks. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread abuse occurs.

Mitigation Recommendations

Immediate mitigation involves updating the 'Stripe Payment Forms by WP Full Pay' plugin to a patched version once released by themeisle. Until a patch is available, organizations should implement strict input validation and sanitization on the 'wpfs-form-name' parameter at the web application level, using web application firewalls (WAFs) to detect and block SQL injection patterns targeting this parameter. Employing parameterized queries or prepared statements in custom code interfacing with the plugin can reduce risk. Monitoring database logs and web server logs for anomalous SQL queries or repeated access attempts to the vulnerable parameter is critical for early detection. Organizations should also conduct security audits of their WordPress environment, ensuring minimal plugin usage and adherence to the principle of least privilege for database accounts. Regular backups and incident response plans should be updated to address potential data breaches. Finally, educating site administrators about the risks and signs of exploitation can enhance organizational readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-21T19:32:17.388Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fc745a55d697d32d4390da

Added to database: 10/25/2025, 6:55:22 AM

Last enriched: 11/1/2025, 7:21:18 AM

Last updated: 12/7/2025, 10:55:18 AM

Views: 202

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats