CVE-2025-10047
MEDIUMCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
2Description
The Email Tracker - Email Log, Email Open Tracking, Email Analytics & Email Management for WordPress Emails plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 5.3.15 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Analysis
SQL injection in Email Tracker plugin for WordPress (versions up to 5.3.15) allows authenticated administrators to extract sensitive database information via the 'orderby' parameter due to insufficient escaping and query preparation. CVSS 4.9 reflects high confidentiality impact but requires high-privilege authenticated access; no public exploit code or active exploitation confirmed at analysis time.
Technical Context
The Email Tracker plugin processes user-supplied input through the 'orderby' parameter without proper SQL escaping or parameterized query preparation, violating CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). The vulnerability exists in SQL query construction where the orderby value is concatenated directly into the query string rather than bound as a prepared statement parameter. This allows authenticated administrators to inject arbitrary SQL clauses (UNION SELECT, subqueries, etc.) to read unauthorized data from the WordPress database. The plugin's database interaction layer fails to sanitize this parameter before SQL execution.
Affected Products
Email Tracker - Email Log, Email Open Tracking, Email Analytics & Email Management for WordPress Emails plugin for WordPress in all versions up to and including 5.3.15. The vulnerable component is the 'orderby' parameter handler in the plugin's email query interface. Affected installations should reference the WordPress plugin repository changeset and Wordfence vulnerability advisory (CVE-2025-10047, ID: ec4be524-a763-4f2b-8a1d-6189014b4d86) for version-specific impact details.
Remediation
Update Email Tracker plugin to version 5.3.16 or later, which corrects the insufficient escaping and implements proper SQL query preparation via parameterized statements. Administrators should immediately apply this patch through the WordPress plugin update mechanism. As an interim mitigation for sites unable to patch immediately, restrict Administrator role assignments to trusted personnel only and monitor database query logs for suspicious SQL patterns in plugin activity. The Wordfence advisory provides additional detection guidance; review the plugin repository changeset for specific code changes in the patched version.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today