SQL Injection Vulnerability in WPMU Prefill Post by Benjamin Santalucia
CVE-2025-22507

7.6HIGH

Key Information:

Vendor
Benjamin Santalucia ([email protected])
Status
WPmu Prefill Post
Vendor
CVE Published:
7 January 2025

Summary

The WPMU Prefill Post plugin, developed by Benjamin Santalucia, is susceptible to an SQL Injection flaw. This vulnerability allows attackers to manipulate SQL queries by injecting malicious inputs, potentially leading to unauthorized access and data exposure. The affected versions range from n/a to 1.02. It is essential for users of this plugin to implement security measures to safeguard their WordPress sites against potential exploitation.

Affected Version(s)

WPMU Prefill Post <= 1.02

References

CVSS V3.1

Score:
7.6
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database

Credit

João Pedro S Alcântara (Kinorth) (Patchstack Alliance)
.