CVE-2025-23910

8.5 HIGH

📋 TL;DR

This SQL injection vulnerability in the WordPress Menus Plus+ plugin allows attackers to execute arbitrary SQL commands on the database. It affects all WordPress sites running Menus Plus+ plugin versions up to 1.9.6. Successful exploitation could lead to data theft, modification, or deletion.

💻 Affected Systems

Products:
  • WordPress Menus Plus+ Plugin
Versions: All versions up to and including 1.9.6
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Menus Plus+ plugin active. No special configuration needed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data exfiltration, privilege escalation, and potential remote code execution via database functions.

🟠

Likely Case

Unauthorized data access, modification of database content, and potential site defacement.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage to non-critical data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of SQL injection techniques and WordPress plugin structure. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.9.6

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/menus-plus/vulnerability/wordpress-menus-plus-plugin-1-9-6-sql-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Menus Plus+ plugin
4. Click 'Update Now' if available
5. If no update available, deactivate and remove plugin
6. Install latest version from WordPress repository

🔧 Temporary Workarounds

Input Sanitization

all

Add custom input validation to filter SQL special characters

Add wpdb->prepare() statements around all database queries in plugin code

🧯 If You Can't Patch

  • Deactivate and remove the Menus Plus+ plugin immediately
  • Implement web application firewall (WAF) rules to block SQL injection patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Menus Plus+ version 1.9.6 or earlier

Check Version:

wp plugin list --name=menus-plus --field=version

Verify Fix Applied:

Verify Menus Plus+ plugin version is higher than 1.9.6 or plugin is removed

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries in WordPress debug logs
  • Multiple failed login attempts with SQL syntax in parameters

Network Indicators:

  • HTTP requests containing SQL keywords (SELECT, UNION, etc.) to WordPress admin-ajax.php or plugin endpoints

SIEM Query:

source="wordpress.log" AND ("SQL syntax" OR "database error" OR "wpdb->prepare")

🔗 References

📤 Share & Export