CVE-2025-10748
MEDIUMCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
2Description
The RapidResult plugin for WordPress is vulnerable to SQL Injection via the 's' parameter in all versions up to, and including, 1.2. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with contributor-level permissions and above to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Analysis
SQL injection in RapidResult WordPress plugin versions up to 1.2 allows authenticated attackers with contributor-level permissions to extract sensitive database information via insufficient escaping of the 's' parameter. The vulnerability affects all versions through 1.2 and requires valid WordPress account credentials, limiting exposure to sites where user registration is enabled or internal contributors exist.
Technical Context
The vulnerability stems from CWE-89 (SQL Injection) caused by insufficient input escaping and lack of parameterized query preparation in the RapidResult plugin. The 's' parameter is passed directly into SQL queries without proper escaping or prepared statement binding, allowing attackers to inject arbitrary SQL syntax. As a WordPress plugin operating within the WordPress plugin architecture, the vulnerability is exploitable through authenticated requests to the plugin's functionality. The plugin processes user-supplied search parameters without implementing WordPress security functions such as wpdb->prepare() for query parameterization or proper sanitization via esc_sql().
Affected Products
The RapidResult WordPress plugin in all versions up to and including 1.2 is affected. The plugin is distributed through the official WordPress plugin repository at https://plugins.trac.wordpress.org/browser/rapidresult/. Wordfence intelligence confirms the vulnerability affects the plugin's core file (rapidresult.php at line 112 in version 1.2) and provides advisory reference at https://www.wordfence.com/threat-intel/vulnerabilities/id/4e5d7d04-f73a-48ea-81e3-36a514c76cc6.
Remediation
Sites using RapidResult should immediately upgrade to a patched version released after version 1.2. The WordPress plugin repository changeset 3383652 indicates a fix has been applied upstream. Verify the latest version available in the WordPress plugin dashboard and upgrade to the current release, which includes the SQL injection fix. As an interim workaround for sites unable to update immediately, restrict contributor-level permissions and above to trusted administrators only by managing WordPress user roles in Settings > Users, limiting the attack surface to fewer authenticated accounts. Consult the Wordfence advisory at https://www.wordfence.com/threat-intel/vulnerabilities/id/4e5d7d04-f73a-48ea-81e3-36a514c76cc6 for detailed remediation guidance and verification steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today