CVE-2025-10047

MEDIUM
2025-10-22 [email protected]
4.9
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 08, 2026 - 19:39 vuln.today
CVE Published
Oct 22, 2025 - 09:15 nvd
MEDIUM 4.9

Description

The Email Tracker - Email Log, Email Open Tracking, Email Analytics & Email Management for WordPress Emails plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 5.3.15 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Analysis

SQL injection in Email Tracker plugin for WordPress (versions up to 5.3.15) allows authenticated administrators to extract sensitive database information via the 'orderby' parameter due to insufficient escaping and query preparation. CVSS 4.9 reflects high confidentiality impact but requires high-privilege authenticated access; no public exploit code or active exploitation confirmed at analysis time.

Technical Context

The Email Tracker plugin processes user-supplied input through the 'orderby' parameter without proper SQL escaping or parameterized query preparation, violating CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). The vulnerability exists in SQL query construction where the orderby value is concatenated directly into the query string rather than bound as a prepared statement parameter. This allows authenticated administrators to inject arbitrary SQL clauses (UNION SELECT, subqueries, etc.) to read unauthorized data from the WordPress database. The plugin's database interaction layer fails to sanitize this parameter before SQL execution.

Affected Products

Email Tracker - Email Log, Email Open Tracking, Email Analytics & Email Management for WordPress Emails plugin for WordPress in all versions up to and including 5.3.15. The vulnerable component is the 'orderby' parameter handler in the plugin's email query interface. Affected installations should reference the WordPress plugin repository changeset and Wordfence vulnerability advisory (CVE-2025-10047, ID: ec4be524-a763-4f2b-8a1d-6189014b4d86) for version-specific impact details.

Remediation

Update Email Tracker plugin to version 5.3.16 or later, which corrects the insufficient escaping and implements proper SQL query preparation via parameterized statements. Administrators should immediately apply this patch through the WordPress plugin update mechanism. As an interim mitigation for sites unable to patch immediately, restrict Administrator role assignments to trusted personnel only and monitor database query logs for suspicious SQL patterns in plugin activity. The Wordfence advisory provides additional detection guidance; review the plugin repository changeset for specific code changes in the patched version.

Priority Score

24
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +24
POC: 0

Share

CVE-2025-10047 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy