EUVD-2025-17161

| CVE-2025-26590 HIGH
2025-06-06 [email protected]
7.6
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 18:10 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 18:10 euvd
EUVD-2025-17161
CVE Published
Jun 06, 2025 - 13:15 nvd
HIGH 7.6

DescriptionNVD

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nir Complete Google Seo Scan allows SQL Injection. This issue affects Complete Google Seo Scan: from n/a through 3.5.1.

AnalysisAI

SQL Injection vulnerability in Nir Complete Google SEO Scan plugin (versions up to 3.5.1) that allows authenticated attackers with high privileges to execute arbitrary SQL commands against the database. While the CVSS score is 7.6 (high), the attack requires administrative credentials and does not enable data modification, limiting real-world impact to information disclosure and service degradation. No active exploitation in the wild has been confirmed at this time.

Technical ContextAI

The vulnerability exists in the Complete Google SEO Scan WordPress plugin, a tool designed to scan and analyze websites for Google SEO compliance. The root cause is CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), indicating that user-supplied input is inadequately sanitized before being incorporated into SQL queries. The affected component likely processes SEO scan parameters, filter criteria, or report generation functions without proper parameterized query implementation or input validation. The plugin operates within the WordPress ecosystem, meaning vulnerability exploitation would occur through the WordPress database abstraction layer (typically MySQL/MariaDB). The issue affects versions from an unspecified baseline through version 3.5.1.

Share

EUVD-2025-17161 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy