EUVD-2025-16842

| CVE-2025-4578 CRITICAL
2025-06-04 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 17:29 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:29 euvd
EUVD-2025-16842
PoC Detected
Jun 04, 2025 - 20:07 vuln.today
Public exploit code
CVE Published
Jun 04, 2025 - 06:15 nvd
CRITICAL 9.8

Description

The File Provider WordPress plugin through 1.2.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection

Analysis

SQL injection in File Provider WordPress plugin through 1.2.3. PoC available.

Technical Context

CWE-89.

Affected Products

['File Provider <= 1.2.3']

Remediation

Update.

Priority Score

69
Low Medium High Critical
KEV: 0
EPSS: +0.3
CVSS: +49
POC: +20

Share

EUVD-2025-16842 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy