CVE-2025-6717

MEDIUM
2025-07-18 [email protected]
6.5
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 08, 2026 - 19:39 vuln.today
CVE Published
Jul 18, 2025 - 06:15 nvd
MEDIUM 6.5

DescriptionNVD

The B1.lt plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 2.2.56 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AnalysisAI

SQL Injection in B1.lt WordPress plugin up to version 2.2.56 allows authenticated attackers with Subscriber-level access to extract sensitive database information via an unescaped 'id' parameter. The vulnerability requires valid user credentials and network access but involves minimal interaction, making it a moderate risk for WordPress installations with many trusted users. No public exploit code or active exploitation has been confirmed.

Technical ContextAI

The B1.lt plugin (also marketed as B1 Accounting) fails to properly escape and prepare SQL queries for user-supplied input in the 'id' parameter. This is a classic SQL Injection vulnerability (CWE-89) where insufficient input validation and lack of prepared statement usage allow attackers to manipulate SQL query logic. Authenticated users at Subscriber level or above can append arbitrary SQL commands to extract unauthorized data from the WordPress database. The vulnerability affects the plugin's query handling mechanism where dynamic SQL construction occurs without adequate parameterization or escaping functions.

Affected ProductsAI

The B1.lt plugin (also known as B1 Accounting plugin for WordPress) is affected in all versions up to and including 2.2.56. The plugin is hosted on the official WordPress Plugin Repository at wordpress.org/plugins/b1-accounting/. Users running versions 2.2.56 or earlier are vulnerable; version information for patched releases was not independently confirmed from the provided references.

RemediationAI

Update the B1.lt plugin to the latest available version beyond 2.2.56 from the WordPress Plugin Repository. The patch reference indicates a changeset was made to the plugin repository (visible at the provided Trac URL), suggesting a patched version is available. Site administrators should immediately update the plugin through the WordPress admin dashboard. As an interim mitigation for sites unable to update immediately, restrict Subscriber-level user accounts or temporarily deactivate the plugin if it is not critical to operations. For additional details and confirmation of the patched version, consult the Wordfence vulnerability advisory at the provided reference URL.

Share

CVE-2025-6717 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy