CVE-2025-4578

The File Provider WordPress plugin through 1.2.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:dimdavid:file_provider:*:*:*:*:*:wordpress:*:*

History

04 Jun 2025, 20:07

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/3aa76b96-40b7-4bde-a39c-c1aa6f8278fc/ - () https://wpscan.com/vulnerability/3aa76b96-40b7-4bde-a39c-c1aa6f8278fc/ - Exploit, Third Party Advisory
First Time Dimdavid file Provider
Dimdavid
CWE CWE-89
CPE cpe:2.3:a:dimdavid:file_provider:*:*:*:*:*:wordpress:*:*

04 Jun 2025, 14:15

Type Values Removed Values Added
Summary
  • (es) El complemento File Provider de WordPress hasta la versión 1.2.3 no depura ni escapa correctamente un parámetro antes de usarlo en una declaración SQL a través de una acción AJAX disponible para usuarios no autenticados, lo que genera una inyección SQL.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

04 Jun 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-04 06:15

Updated : 2025-06-04 20:07


NVD link : CVE-2025-4578

Mitre link : CVE-2025-4578

CVE.ORG link : CVE-2025-4578


JSON object : View

Products Affected

dimdavid

  • file_provider
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')