SQL Injection Vulnerability in WP-PManager WordPress Plugin
CVE-2025-2248

5.4MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
15 May 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-2248?

The WP-PManager plugin for WordPress, up to version 1.2, is vulnerable due to improper sanitization of user-supplied data before it is executed in an SQL statement. This oversight allows attackers to execute arbitrary SQL commands, potentially compromising the database and leading to unauthorized data exposure or manipulation. Website administrators using this plugin should take immediate action to update to a patched version to mitigate risks.

Affected Version(s)

WP-PManager 0 <= 1.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Bob Matyas
WPScan
.
The Cyber Security Vulnerability Database.