CVE-2025-2319

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in the EZ SQL Reports Shortcode Widget and DB Backup WordPress plugin allows attackers to execute arbitrary code on the server by tricking administrators into clicking malicious links. It affects plugin versions 4.11.13 through 5.25.08. The vulnerability stems from missing nonce validation in the ELISQLREPORTS_menu function.

💻 Affected Systems

Products:
  • EZ SQL Reports Shortcode Widget and DB Backup WordPress plugin
Versions: 4.11.13 to 5.25.08
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected. The plugin must be active.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise leading to data theft, malware installation, or complete site takeover through remote code execution.

🟠

Likely Case

Unauthorized database access, data manipulation, or privilege escalation through crafted SQL queries.

🟢

If Mitigated

Limited impact with proper user training and security controls, potentially only affecting plugin functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires social engineering to trick authenticated admin into clicking malicious link. Version 5.25.10 restricts exploitation to authenticated admins only.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.25.10

Vendor Advisory: https://plugins.trac.wordpress.org/browser/elisqlreports/tags/5.25.10/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'EZ SQL Reports Shortcode Widget and DB Backup'. 4. Click 'Update Now' if available, or download version 5.25.10 from WordPress repository. 5. Replace plugin files with patched version.

🔧 Temporary Workarounds

Disable vulnerable plugin

WordPress

Temporarily deactivate the plugin until patched

wp plugin deactivate elisqlreports

Implement CSRF protection middleware

WordPress

Add custom nonce validation to WordPress requests

🧯 If You Can't Patch

  • Restrict admin access to trusted networks only
  • Implement strict user training against phishing and suspicious links

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins > Installed Plugins. Look for version between 4.11.13 and 5.25.08.

Check Version:

wp plugin get elisqlreports --field=version

Verify Fix Applied:

Confirm plugin version is 5.25.10 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to ELISQLREPORTS_menu function
  • Multiple failed nonce validation attempts
  • Unexpected SQL query execution in plugin logs

Network Indicators:

  • Suspicious referrer headers in admin requests
  • CSRF attack patterns in web application firewall logs

SIEM Query:

source="wordpress.log" AND "ELISQLREPORTS_menu" AND (status=200 OR status=302)

🔗 References

📤 Share & Export