CVE-2025-28983

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in ClickandPledge Click & Pledge Connect WordPress plugin allows attackers to execute arbitrary SQL commands, potentially leading to privilege escalation. It affects all versions from 25.04010101 through WP6.8. WordPress sites using this plugin are vulnerable to unauthorized administrative access.

💻 Affected Systems

Products:
  • ClickandPledge Click & Pledge Connect WordPress Plugin
Versions: from 25.04010101 through WP6.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the Click & Pledge Connect plugin enabled. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise: attackers gain administrative privileges, execute arbitrary SQL commands, steal sensitive data, install backdoors, or take over the entire WordPress installation.

🟠

Likely Case

Privilege escalation leading to administrative access, allowing attackers to modify content, install malicious plugins/themes, or exfiltrate user data and payment information.

🟢

If Mitigated

Limited impact if proper WAF rules block SQL injection patterns and database permissions are restricted, though vulnerability remains present.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities in WordPress plugins are frequently weaponized quickly. The high CVSS score suggests straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after WP6.8

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/click-pledge-connect/vulnerability/wordpress-click-pledge-connect-plugin-25-04010101-wp6-8-privilege-escalation-via-sql-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Click & Pledge Connect plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove the plugin immediately.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns targeting this plugin

Database User Permission Reduction

linux

Restrict database user permissions to SELECT only where possible

mysql -u root -p -e "REVOKE INSERT, UPDATE, DELETE, DROP, CREATE, ALTER ON wordpress_db.* FROM 'wp_user'@'localhost';"
mysql -u root -p -e "FLUSH PRIVILEGES;"

🧯 If You Can't Patch

  • Immediately disable the Click & Pledge Connect plugin via WordPress admin or filesystem
  • Implement network segmentation to isolate the vulnerable system from sensitive data

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Click & Pledge Connect version. If version is between 25.04010101 and WP6.8 inclusive, system is vulnerable.

Check Version:

wp plugin list --name=click-pledge-connect --field=version

Verify Fix Applied:

Verify plugin version is higher than WP6.8 or plugin is completely removed from /wp-content/plugins/ directory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs containing 'click-pledge-connect' related tables
  • Multiple failed login attempts followed by successful admin login from new IP
  • WordPress audit logs showing plugin file modifications

Network Indicators:

  • HTTP requests to /wp-content/plugins/click-pledge-connect/ with SQL injection patterns in parameters
  • Unusual outbound connections from WordPress server after plugin access

SIEM Query:

source="wordpress_logs" AND ("click-pledge-connect" OR "clickandpledge") AND ("union select" OR "sleep(" OR "benchmark(" OR "' OR '1'='1")

🔗 References

📤 Share & Export