CVE-2025-23910
📋 TL;DR
This SQL injection vulnerability in the WordPress Menus Plus+ plugin allows attackers to execute arbitrary SQL commands on the database. It affects all WordPress sites running Menus Plus+ plugin versions up to 1.9.6. Successful exploitation could lead to data theft, modification, or deletion.
💻 Affected Systems
- WordPress Menus Plus+ Plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data exfiltration, privilege escalation, and potential remote code execution via database functions.
Likely Case
Unauthorized data access, modification of database content, and potential site defacement.
If Mitigated
Limited impact with proper input validation and database permissions restricting damage to non-critical data.
🎯 Exploit Status
Exploitation requires understanding of SQL injection techniques and WordPress plugin structure. No public exploit code available at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 1.9.6
Vendor Advisory: https://patchstack.com/database/wordpress/plugin/menus-plus/vulnerability/wordpress-menus-plus-plugin-1-9-6-sql-injection-vulnerability?_s_id=cve
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Menus Plus+ plugin
4. Click 'Update Now' if available
5. If no update available, deactivate and remove plugin
6. Install latest version from WordPress repository
🔧 Temporary Workarounds
Input Sanitization
allAdd custom input validation to filter SQL special characters
Add wpdb->prepare() statements around all database queries in plugin code
🧯 If You Can't Patch
- Deactivate and remove the Menus Plus+ plugin immediately
- Implement web application firewall (WAF) rules to block SQL injection patterns
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for Menus Plus+ version 1.9.6 or earlier
Check Version:
wp plugin list --name=menus-plus --field=version
Verify Fix Applied:
Verify Menus Plus+ plugin version is higher than 1.9.6 or plugin is removed
📡 Detection & Monitoring
Log Indicators:
- Unusual database queries in WordPress debug logs
- Multiple failed login attempts with SQL syntax in parameters
Network Indicators:
- HTTP requests containing SQL keywords (SELECT, UNION, etc.) to WordPress admin-ajax.php or plugin endpoints
SIEM Query:
source="wordpress.log" AND ("SQL syntax" OR "database error" OR "wpdb->prepare")