Skip to main content

CVE-2025-9451: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in smartcatai Smartcat Translator for WPML

Medium
VulnerabilityCVE-2025-9451cvecve-2025-9451cwe-89
Published: Thu Sep 11 2025 (09/11/2025, 07:24:59 UTC)
Source: CVE Database V5
Vendor/Project: smartcatai
Product: Smartcat Translator for WPML

Description

The Smartcat Translator for WPML plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 3.1.69 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Author-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 09/11/2025, 07:33:54 UTC

Technical Analysis

CVE-2025-9451 is a medium severity SQL Injection vulnerability affecting the Smartcat Translator for WPML plugin for WordPress, specifically versions up to and including 3.1.69. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89), particularly via the 'orderby' parameter. This parameter is insufficiently escaped and the underlying SQL query lacks proper preparation, allowing an authenticated attacker with Author-level privileges or higher to inject additional SQL commands. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and privileges at the level of an authenticated user with Author role or above (PR:L). No user interaction is needed (UI:N), and the scope remains unchanged (S:U). The impact primarily affects confidentiality (C:H), with no direct impact on integrity or availability. Exploitation could allow attackers to perform time-based blind SQL injection attacks to extract sensitive data from the WordPress database, potentially including user credentials, content, or configuration details. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the common use of WPML and Smartcat Translator plugins in multilingual WordPress sites. The lack of patches or official fixes at the time of publication increases the urgency for mitigation. Given the nature of the vulnerability, attackers must have authenticated access with Author-level permissions, which limits exposure but still represents a critical risk within compromised or insider threat scenarios.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive data stored within WordPress databases, including personal data protected under GDPR. Multilingual websites using WPML and Smartcat Translator plugins are common among European businesses, government agencies, and NGOs, making them potential targets. Successful exploitation could undermine data confidentiality, damage organizational reputation, and lead to regulatory penalties. Since the attack requires authenticated access, the threat is heightened in environments with weak access controls or compromised user accounts. The extraction of sensitive information could facilitate further attacks such as privilege escalation, lateral movement, or targeted phishing campaigns. Additionally, the vulnerability could be exploited to gather intelligence on internal systems or user data, impacting privacy and compliance obligations. The medium severity rating suggests a moderate but tangible risk that demands prompt attention to prevent exploitation, especially in sectors handling sensitive or regulated data.

Mitigation Recommendations

1. Immediate mitigation should include restricting Author-level privileges to trusted users only and reviewing user roles and permissions to minimize unnecessary access. 2. Implement Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'orderby' parameter in the Smartcat Translator plugin. 3. Monitor WordPress logs and database query logs for unusual or suspicious activity indicative of SQL injection attempts. 4. Apply strict input validation and sanitization on all user-supplied parameters, especially those influencing SQL queries, even if originating from authenticated users. 5. If possible, disable or remove the Smartcat Translator for WPML plugin until a vendor patch is released. 6. Employ database-level protections such as least privilege for the WordPress database user to limit data exposure in case of injection. 7. Regularly update WordPress core, plugins, and themes to the latest versions once patches addressing this vulnerability become available. 8. Conduct security awareness training for administrators and content authors to recognize and report suspicious behavior that could indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-25T14:10:58.778Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c27a22e1c560fa9d94d49c

Added to database: 9/11/2025, 7:28:34 AM

Last enriched: 9/11/2025, 7:33:54 AM

Last updated: 9/11/2025, 7:07:37 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats