CVE-2025-48118

| EUVD-2025-18537 HIGH
2025-06-17 [email protected]
8.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
Low

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 22:15 euvd
EUVD-2025-18537
Analysis Generated
Mar 14, 2026 - 22:15 vuln.today
CVE Published
Jun 17, 2025 - 15:15 nvd
HIGH 8.5

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WpExperts Hub Woocommerce Partial Shipment allows SQL Injection. This issue affects Woocommerce Partial Shipment: from n/a through 3.2.

Analysis

SQL injection vulnerability in WpExperts Hub's Woocommerce Partial Shipment plugin (versions up to 3.2) that allows authenticated attackers with low privileges to execute arbitrary SQL queries. The vulnerability has a CVSS score of 8.5 (High) with network accessibility and low attack complexity, enabling attackers to read sensitive database information and potentially disrupt service availability. The attack requires valid user credentials but no special interaction, making it a significant risk for multi-user WordPress/WooCommerce installations.

Technical Context

This vulnerability stems from improper neutralization of special characters in SQL commands (CWE-89: Improper Neutralization of Special Elements used in an SQL Command) within the WpExperts Hub Woocommerce Partial Shipment plugin. The root cause is the failure to properly sanitize or parameterize user-supplied input before incorporating it into SQL queries. The affected product is a WordPress WooCommerce extension (CPE pattern: wp:woocommerce_partial_shipment or similar plugin identifier) that handles shipment processing in e-commerce environments. The vulnerability likely exists in shipment query filtering, order processing, or tracking features where user input is concatenated directly into database queries without using prepared statements or parameterized queries.

Affected Products

WpExperts Hub Woocommerce Partial Shipment plugin: versions 0 through 3.2 (inclusive). Affected product identifier: WordPress plugin 'woocommerce-partial-shipment' by WpExperts. Affected installations include any WordPress site with WooCommerce enabled and this plugin active. All user roles with access to shipment management features in WooCommerce admin are potential attack vectors (shop managers, administrators). The vulnerability affects the plugin's core database query functionality, not WordPress or WooCommerce core.

Remediation

Immediate actions: (1) Update Woocommerce Partial Shipment plugin to version 3.3 or later (patch details should be verified on WpExperts Hub official repository or WordPress.org plugin page). (2) If patch unavailable, immediately disable the plugin and use alternative shipment handling until patched. (3) Conduct database audit to identify suspicious queries in logs from the plugin's query endpoints. Longer-term mitigations: (1) Implement Web Application Firewall (WAF) rules to detect SQL injection patterns in shipment-related requests. (2) Apply principle of least privilege—restrict admin/shipment management access to trusted staff only. (3) Use WordPress security plugins (e.g., Wordfence, Sucuri) to monitor for SQL injection attempts. (4) Enable WordPress database query logging to detect exploitation. Vendor advisory: Check WpExperts Hub official website and WordPress.org Woocommerce Partial Shipment plugin page for patch release notes and timeline.

Priority Score

43
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +42
POC: 0

Share

CVE-2025-48118 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy