CVE-2025-49328

| EUVD-2025-17244 HIGH
2025-06-06 [email protected]
7.6
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 18:10 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 18:10 euvd
EUVD-2025-17244
CVE Published
Jun 06, 2025 - 13:15 nvd
HIGH 7.6

DescriptionNVD

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Agile Logix Store Locator WordPress allows SQL Injection. This issue affects Store Locator WordPress: from n/a through 1.5.1.

AnalysisAI

SQL injection vulnerability in Agile Logix Store Locator WordPress plugin (versions up to 1.5.1) that allows authenticated attackers with high privileges to execute arbitrary SQL commands. The vulnerability has a CVSS score of 7.6 with high confidentiality impact and limited availability impact, though it requires administrative-level privileges to exploit. The scope is changed, indicating potential impact beyond the vulnerable component itself.

Technical ContextAI

This vulnerability is classified as CWE-89 (Improper Neutralization of Special Elements used in an SQL Command - SQL Injection), a fundamental input validation flaw in database query construction. The Agile Logix Store Locator WordPress plugin fails to properly sanitize and parameterize user-supplied input before incorporating it into SQL queries. The affected technology is WordPress plugin architecture running on PHP with WordPress database abstraction layers. The vulnerability exists in the Store Locator plugin specifically designed for location-based search functionality, likely in database query handling for store filtering, searching, or location queries. The lack of prepared statements or proper input escaping allows attackers to break out of intended SQL syntax and inject arbitrary commands.

RemediationAI

Immediate actions: (1) Update the Store Locator plugin to version 1.5.2 or later once released by Agile Logix (monitor official plugin repository); (2) Restrict WordPress administrator account access to trusted users only, implementing principle of least privilege; (3) Implement WordPress user role management to limit database query capability; (4) Disable the Store Locator plugin if not actively used until patching is available. Long-term mitigations: (1) Apply prepared statements/parameterized queries in plugin code using WordPress $wpdb->prepare(); (2) Implement input validation and sanitization using WordPress sanitization functions (sanitize_text_field, sanitize_sql_orderby); (3) Add Web Application Firewall (WAF) rules to detect SQL injection patterns in Store Locator queries; (4) Enable WordPress security audit logging to monitor database queries from administrative functions.

Share

CVE-2025-49328 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy