CVE-2025-30562

| EUVD-2025-18550 HIGH
2025-06-17 [email protected]
8.5
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
Low

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 22:15 euvd
EUVD-2025-18550
Analysis Generated
Mar 14, 2026 - 22:15 vuln.today
CVE Published
Jun 17, 2025 - 15:15 nvd
HIGH 8.5

DescriptionNVD

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpdistillery Navigation Tree Elementor allows Blind SQL Injection. This issue affects Navigation Tree Elementor: from n/a through 1.0.1.

AnalysisAI

A blind SQL injection vulnerability exists in wpdistillery Navigation Tree Elementor plugin (versions up to 1.0.1) that allows authenticated users to extract sensitive database information through specially crafted input. The vulnerability requires user authentication but operates over the network with low attack complexity, enabling attackers with WordPress user accounts to enumerate and exfiltrate data without direct visibility of query results. No publicly disclosed proof-of-concept or active exploitation in KEV has been confirmed at this time, though the 8.5 CVSS score and SQL injection nature warrant immediate patching.

Technical ContextAI

This vulnerability exploits improper input sanitization in the Navigation Tree Elementor WordPress plugin (CWE-89: Improper Neutralization of Special Elements used in an SQL Command). The plugin likely constructs SQL queries using user-supplied input without adequate parameterized query protection or input validation. Blind SQL injection attacks differ from standard SQL injection by not returning query results directly; instead, attackers infer database content through response-time analysis, boolean-based inference, or error-based channels. The vulnerability affects the Elementor page builder ecosystem, a widely-deployed WordPress plugin framework. The attack vector is network-based (CVSS:3.1/AV:N), requiring authentication (PR:L), indicating WordPress user roles can trigger exploitation. The scope change (S:C) suggests the vulnerability impacts resources beyond the vulnerable component, potentially affecting other WordPress instances or shared database resources.

RemediationAI

Update plugin via WordPress admin dashboard or directly from wpdistillery repository. Workaround (Temporary): Use WordPress role management to remove Elementor access from lower-privilege user accounts pending patch availability. Mitigation: Deploy WAF signatures for SQL injection in WordPress plugin requests; monitor for unusual query patterns. Code-Level Fix: Vendor should audit all Navigation Tree Elementor SQL calls and apply parameterized query patterns.

Share

CVE-2025-30562 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy