CVE-2025-30524

9.3 CRITICAL

📋 TL;DR

This SQL injection vulnerability in the origincode Product Catalog WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It affects all versions up to 1.0.4, potentially compromising websites using this plugin.

💻 Affected Systems

Products:
  • origincode Product Catalog (WordPress plugin)
Versions: n/a through 1.0.4
Operating Systems: Any running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress sites with the plugin installed and active; no specific configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, modification, or deletion, and potential remote code execution via database functions.

🟠

Likely Case

Unauthorized access to sensitive data (e.g., user credentials, product info) and potential website defacement.

🟢

If Mitigated

Limited impact if input validation and parameterized queries are enforced, but risk remains if plugin is unpatched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection is a common attack vector; public details suggest unauthenticated exploitation is possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.5 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/displayproduct/vulnerability/wordpress-product-catalog-plugin-1-0-4-sql-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins > Installed Plugins. 3. Find 'Product Catalog' and update to version 1.0.5 or later. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the plugin to prevent exploitation until patching is possible.

wp plugin deactivate product-catalog

Web Application Firewall (WAF)

all

Deploy a WAF to block SQL injection attempts targeting the plugin endpoints.

🧯 If You Can't Patch

  • Restrict network access to the WordPress site to trusted IPs only.
  • Implement strict input validation and sanitization in custom code interacting with the plugin.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins; if version is 1.0.4 or earlier, it is vulnerable.

Check Version:

wp plugin get product-catalog --field=version

Verify Fix Applied:

After updating, confirm the plugin version is 1.0.5 or later in the same location.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in web server logs
  • Multiple failed login attempts or unexpected database queries

Network Indicators:

  • HTTP requests with SQL keywords (e.g., UNION, SELECT) targeting plugin-specific endpoints

SIEM Query:

source="web_logs" AND (url="*product-catalog*" AND (query="*SELECT*" OR query="*UNION*" OR query="*INSERT*"))

🔗 References

📤 Share & Export