CVE-2025-68496

9.8 CRITICAL

📋 TL;DR

This CVE describes a blind SQL injection vulnerability in the User Feedback Lite WordPress plugin. Attackers can inject malicious SQL commands through the plugin's input fields, potentially accessing or manipulating the WordPress database. All WordPress sites running User Feedback Lite version 1.10.1 or earlier are affected.

💻 Affected Systems

Products:
  • User Feedback Lite WordPress Plugin
Versions: n/a through <= 1.10.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with the vulnerable plugin version installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full database compromise leading to data theft, privilege escalation, complete site takeover, or database destruction.

🟠

Likely Case

Unauthorized data extraction from the WordPress database, including user credentials, sensitive content, or configuration data.

🟢

If Mitigated

Limited data exposure if proper input validation and WAF rules block injection attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities in WordPress plugins are frequently exploited in the wild. The public disclosure increases weaponization likelihood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: >1.10.1

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/userfeedback-lite/vulnerability/wordpress-user-feedback-plugin-1-10-1-sql-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'User Feedback Lite'. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched version is available.

wp plugin deactivate userfeedback-lite

Web Application Firewall Rules

all

Implement WAF rules to block SQL injection patterns targeting the plugin.

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in custom code
  • Deploy a web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > User Feedback Lite version number. If version is 1.10.1 or earlier, you are vulnerable.

Check Version:

wp plugin get userfeedback-lite --field=version

Verify Fix Applied:

Verify plugin version is greater than 1.10.1 and test form submissions for SQL injection attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries in WordPress debug logs
  • Multiple failed login attempts following plugin access
  • SQL syntax errors in web server logs

Network Indicators:

  • HTTP POST requests with SQL keywords to plugin endpoints
  • Unusual outbound database connections

SIEM Query:

source="web_logs" AND ("userfeedback" OR "wp-content/plugins/userfeedback-lite") AND ("UNION" OR "SELECT" OR "INSERT" OR "DELETE" OR "' OR '" OR "--")

🔗 References

📤 Share & Export