CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
Lifecycle Timeline
3DescriptionNVD
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpdistillery Navigation Tree Elementor allows Blind SQL Injection. This issue affects Navigation Tree Elementor: from n/a through 1.0.1.
AnalysisAI
A blind SQL injection vulnerability exists in wpdistillery Navigation Tree Elementor plugin (versions up to 1.0.1) that allows authenticated users to extract sensitive database information through specially crafted input. The vulnerability requires user authentication but operates over the network with low attack complexity, enabling attackers with WordPress user accounts to enumerate and exfiltrate data without direct visibility of query results. No publicly disclosed proof-of-concept or active exploitation in KEV has been confirmed at this time, though the 8.5 CVSS score and SQL injection nature warrant immediate patching.
Technical ContextAI
This vulnerability exploits improper input sanitization in the Navigation Tree Elementor WordPress plugin (CWE-89: Improper Neutralization of Special Elements used in an SQL Command). The plugin likely constructs SQL queries using user-supplied input without adequate parameterized query protection or input validation. Blind SQL injection attacks differ from standard SQL injection by not returning query results directly; instead, attackers infer database content through response-time analysis, boolean-based inference, or error-based channels. The vulnerability affects the Elementor page builder ecosystem, a widely-deployed WordPress plugin framework. The attack vector is network-based (CVSS:3.1/AV:N), requiring authentication (PR:L), indicating WordPress user roles can trigger exploitation. The scope change (S:C) suggests the vulnerability impacts resources beyond the vulnerable component, potentially affecting other WordPress instances or shared database resources.
RemediationAI
Update plugin via WordPress admin dashboard or directly from wpdistillery repository. Workaround (Temporary): Use WordPress role management to remove Elementor access from lower-privilege user accounts pending patch availability. Mitigation: Deploy WAF signatures for SQL injection in WordPress plugin requests; monitor for unusual query patterns. Code-Level Fix: Vendor should audit all Navigation Tree Elementor SQL calls and apply parameterized query patterns.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18550