CVE-2025-30788

8.2 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the Eli EZ SQL Reports Shortcode Widget and DB Backup WordPress plugin allows attackers to trick authenticated administrators into performing unintended SQL injection actions. This affects WordPress sites using the plugin versions up to 5.25.08, potentially leading to data theft or manipulation. The vulnerability combines CSRF with SQL injection, requiring user interaction but no authentication for exploitation.

💻 Affected Systems

Products:
  • Eli EZ SQL Reports Shortcode Widget and DB Backup
Versions: n/a through 5.25.08
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the plugin enabled; default configurations are vulnerable as CSRF protections are missing.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary SQL commands via CSRF, leading to full database compromise, data exfiltration, or site takeover.

🟠

Likely Case

Unauthorized SQL queries that modify or delete data, disrupt site functionality, or extract sensitive information like user credentials.

🟢

If Mitigated

With proper CSRF tokens and input validation, the risk is minimized to no impact, as requests would be blocked or sanitized.

🌐 Internet-Facing: HIGH, as WordPress sites are typically internet-facing, making them accessible to remote attackers who can craft malicious requests.
🏢 Internal Only: MEDIUM, as internal users might still be tricked into clicking malicious links, but exposure is limited to the internal network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires tricking an authenticated user into clicking a malicious link, combining CSRF with SQL injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 5.25.08

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/elisqlreports/vulnerability/wordpress-ez-sql-reports-shortcode-widget-and-db-backup-plugin-5-25-08-csrf-to-sql-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Eli EZ SQL Reports Shortcode Widget and DB Backup' and update to the latest version. 4. Verify the update completes successfully.

🔧 Temporary Workarounds

Disable Plugin

WordPress

Temporarily deactivate the plugin to prevent exploitation until patching is possible.

wp plugin deactivate elisqlreports

Implement CSRF Protection

all

Add custom CSRF tokens to plugin forms if source code access is available, though this is complex and not recommended over patching.

🧯 If You Can't Patch

  • Restrict plugin access to trusted users only and monitor for suspicious activity.
  • Use web application firewalls (WAF) to block SQL injection and CSRF attempts.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins; if version is 5.25.08 or earlier, it is vulnerable.

Check Version:

wp plugin get elisqlreports --field=version

Verify Fix Applied:

After updating, confirm the plugin version is above 5.25.08 in the same location and test functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs, especially from admin sessions triggered by external requests.

Network Indicators:

  • HTTP POST requests to plugin endpoints without CSRF tokens, originating from untrusted sources.

SIEM Query:

Example: source="wordpress_logs" AND (event="sql_error" OR event="admin_action") AND plugin="elisqlreports"

🔗 References

📤 Share & Export