SQL Injection Vulnerability in WP-PManager WordPress Plugin
CVE-2025-2248
5.4MEDIUM
Key Information:
- Vendor
WordPress
- Status
- Vendor
- CVE Published:
- 15 May 2025
Badges
👾 Exploit Exists🟡 Public PoC
What is CVE-2025-2248?
The WP-PManager plugin for WordPress, up to version 1.2, is vulnerable due to improper sanitization of user-supplied data before it is executed in an SQL statement. This oversight allows attackers to execute arbitrary SQL commands, potentially compromising the database and leading to unauthorized data exposure or manipulation. Website administrators using this plugin should take immediate action to update to a patched version to mitigate risks.
Affected Version(s)
WP-PManager 0 <= 1.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Bob Matyas
WPScan