CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
Lifecycle Timeline
3Tags
Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WpExperts Hub Woocommerce Partial Shipment allows SQL Injection. This issue affects Woocommerce Partial Shipment: from n/a through 3.2.
Analysis
SQL injection vulnerability in WpExperts Hub's Woocommerce Partial Shipment plugin (versions up to 3.2) that allows authenticated attackers with low privileges to execute arbitrary SQL queries. The vulnerability has a CVSS score of 8.5 (High) with network accessibility and low attack complexity, enabling attackers to read sensitive database information and potentially disrupt service availability. The attack requires valid user credentials but no special interaction, making it a significant risk for multi-user WordPress/WooCommerce installations.
Technical Context
This vulnerability stems from improper neutralization of special characters in SQL commands (CWE-89: Improper Neutralization of Special Elements used in an SQL Command) within the WpExperts Hub Woocommerce Partial Shipment plugin. The root cause is the failure to properly sanitize or parameterize user-supplied input before incorporating it into SQL queries. The affected product is a WordPress WooCommerce extension (CPE pattern: wp:woocommerce_partial_shipment or similar plugin identifier) that handles shipment processing in e-commerce environments. The vulnerability likely exists in shipment query filtering, order processing, or tracking features where user input is concatenated directly into database queries without using prepared statements or parameterized queries.
Affected Products
WpExperts Hub Woocommerce Partial Shipment plugin: versions 0 through 3.2 (inclusive). Affected product identifier: WordPress plugin 'woocommerce-partial-shipment' by WpExperts. Affected installations include any WordPress site with WooCommerce enabled and this plugin active. All user roles with access to shipment management features in WooCommerce admin are potential attack vectors (shop managers, administrators). The vulnerability affects the plugin's core database query functionality, not WordPress or WooCommerce core.
Remediation
Immediate actions: (1) Update Woocommerce Partial Shipment plugin to version 3.3 or later (patch details should be verified on WpExperts Hub official repository or WordPress.org plugin page). (2) If patch unavailable, immediately disable the plugin and use alternative shipment handling until patched. (3) Conduct database audit to identify suspicious queries in logs from the plugin's query endpoints. Longer-term mitigations: (1) Implement Web Application Firewall (WAF) rules to detect SQL injection patterns in shipment-related requests. (2) Apply principle of least privilege—restrict admin/shipment management access to trusted staff only. (3) Use WordPress security plugins (e.g., Wordfence, Sucuri) to monitor for SQL injection attempts. (4) Enable WordPress database query logging to detect exploitation. Vendor advisory: Check WpExperts Hub official website and WordPress.org Woocommerce Partial Shipment plugin page for patch release notes and timeline.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18537