CVE-2025-10682
MEDIUMCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
2Description
The TARIFFUXX plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.4. This is due to insufficient neutralization of user-supplied input used directly in SQL queries. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject additional SQL into queries and extract sensitive information from the database via a crafted id attribute in the 'tariffuxx_configurator' shortcode.
Analysis
SQL injection in the TARIFFUXX WordPress plugin up to version 1.4 allows authenticated attackers with Contributor-level or higher privileges to inject malicious SQL commands via the 'id' attribute in the 'tariffuxx_configurator' shortcode, enabling unauthorized extraction of sensitive database information. The vulnerability exploits insufficient input sanitization in SQL query construction and requires authenticated access, resulting in a CVSS 6.5 (medium-high) rating with confirmed confidentiality impact but no availability or integrity compromise.
Technical Context
The TARIFFUXX plugin processes user input from the 'tariffuxx_configurator' shortcode's 'id' attribute directly into SQL queries without proper parameterization or prepared statements. The vulnerable code is located in the Tariffuxx_admin.php (line 36) and Tariffuxx_twl.php (line 164) classes, which construct dynamic SQL without neutralizing attacker-controlled input. This is a classic SQL injection vulnerability (CWE-89: Improper Neutralization of Special Elements used in an SQL Command) where concatenation of unsanitized user input into SQL query strings creates a direct path for attackers to manipulate query logic. WordPress plugin authentication context means the attacker must first obtain Contributor-level access or higher, limiting the attack surface to legitimate site users or those who have compromised lower-privileged accounts.
Affected Products
The TARIFFUXX WordPress plugin in versions 1.4 and earlier is affected. The vulnerable code exists in the plugin's core classes (Tariffuxx_admin.php and Tariffuxx_twl.php) that process shortcode attributes. Affected installations are limited to WordPress sites with the TARIFFUXX plugin installed and active, with users holding Contributor-level or higher roles. No specific CVE CPE string is provided in the input data, but the plugin can be identified via wordpress.org plugin repository metadata. Wordfence vulnerability details and plugin repository changeset 3465105 serve as authoritative references.
Remediation
Upgrade the TARIFFUXX plugin to version 1.5 or later, which contains a fix committed in changeset 3465105 addressing the SQL injection vulnerability. The fix implements proper input sanitization and prepared statements to neutralize user-supplied input before SQL query execution. WordPress administrators should access the Plugins dashboard, locate TARIFFUXX, and apply the available update. For immediate mitigation prior to patching, restrict Contributor-level access to trusted users only and audit existing contributors for suspicious activity. Detailed technical remediation guidance is available at the Wordfence vulnerability report (https://www.wordfence.com/threat-intel/vulnerabilities/id/e897a83b-d746-427d-8c31-64d4eab5848e?source=cve) and the plugin repository changeset.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today