SQL Injection Vulnerability in Slider & Popup Builder by Depicter for WordPress
CVE-2025-2011

7.5HIGH

What is CVE-2025-2011?

CVE-2025-2011 is a significant SQL Injection vulnerability identified in the Slider & Popup Builder plugin developed by Depicter for WordPress. This vulnerability affects all versions of the plugin up to and including 3.6.1. SQL Injection occurs due to inadequate escaping of user-supplied parameters, specifically the ‘s’ parameter, which enables unauthenticated attackers to manipulate SQL queries. As a result, attackers can append malicious SQL commands to existing queries, allowing them to extract sensitive information from the database. Given that WordPress is a widely-used platform for website development, the implications of this vulnerability can be extensive, potentially affecting numerous organizations that rely on this plugin for their web functionalities.

Potential impact of CVE-2025-2011

  1. Data Breaches: Attackers leveraging this vulnerability can gain access to sensitive data stored in the database, including user information, payment details, and proprietary content. This poses a significant risk of data breaches that could damage an organization's reputation and lead to regulatory penalties.

  2. Unauthorized Access: The ability to manipulate SQL queries could empower attackers to escalate their privileges or conduct further attacks on the affected server or related applications, ultimately compromising the entire system.

  3. Service Disruption: Through exploitation of the SQL Injection flaw, attackers may execute queries that affect database integrity, leading to denial of service or degradation of application performance, which can severely impact customer experience and operational functionality.

Affected Version(s)

Popup and Slider Builder by Depicter – Add Email collecting Popup, Popup Modal, Coupon Popup, Image Slider, Carousel Slider, Post Slider Carousel * <= 3.6.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

47% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Muhamad Visat Sutarno
.
CVE-2025-2011 : SQL Injection Vulnerability in Slider & Popup Builder by Depicter for WordPress