CVE-2025-39587
📋 TL;DR
This SQL injection vulnerability in the Stylemix Cost Calculator Builder WordPress plugin allows attackers to execute arbitrary SQL commands on the database. All WordPress sites using affected versions of this plugin are vulnerable, potentially exposing sensitive data.
💻 Affected Systems
- Stylemix Cost Calculator Builder WordPress Plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, modification, or deletion; potential privilege escalation to WordPress administrator; possible remote code execution via database functions.
Likely Case
Unauthorized access to sensitive data stored in WordPress database (user credentials, payment information, private content); data manipulation or destruction.
If Mitigated
Limited impact with proper input validation and parameterized queries; potential for data exposure minimized.
🎯 Exploit Status
SQL injection vulnerabilities are commonly weaponized; unauthenticated exploitation increases risk.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.2.66 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Cost Calculator Builder' and click 'Update Now'. 4. Verify update to version 3.2.66 or higher.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate cost-calculator-builder
Web Application Firewall
allImplement WAF rules to block SQL injection attempts
🧯 If You Can't Patch
- Implement strict input validation and parameterized queries in custom code
- Restrict database user permissions to minimum required
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Cost Calculator Builder version
Check Version:
wp plugin get cost-calculator-builder --field=version
Verify Fix Applied:
Verify plugin version is 3.2.66 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- Unusual database queries in WordPress logs
- Multiple failed SQL syntax attempts
- Unexpected database errors
Network Indicators:
- HTTP requests with SQL syntax in parameters
- Unusual traffic to plugin endpoints
SIEM Query:
source="wordpress.log" AND "cost-calculator-builder" AND ("SQL" OR "database error" OR "syntax")