CVE-2025-10289
SQL Injection in WordPress Filter & Grids Plugin Allows Data Exposure
Publication date: 2025-12-13
Last updated on: 2025-12-13
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | filter_and_grids_plugin | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated attackers to perform SQL injection attacks that can extract sensitive information from the database. This exposure of sensitive data could lead to non-compliance with data protection regulations such as GDPR and HIPAA, which require safeguarding personal and sensitive information against unauthorized access. Therefore, exploitation of this vulnerability may result in violations of these standards due to potential data breaches. [2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking if your WordPress site is running the Filter & Grids plugin (also known as ymc-smart-filter) at version 3.2.0 or earlier. Since the vulnerability involves SQL Injection via the 'phrase' parameter in AJAX search requests, monitoring HTTP requests to the plugin's AJAX endpoints for suspicious or malformed 'phrase' parameters could help detect exploitation attempts. Additionally, you can search your plugin files for unsafe SQL query constructions involving the 'phrase' parameter, such as direct insertion into SQL LIKE clauses without sanitization. Specific commands might include: 1. Using grep to find vulnerable code patterns: `grep -r "phrase" wp-content/plugins/ymc-smart-filter/` 2. Using network monitoring tools (e.g., tcpdump or Wireshark) to capture HTTP POST requests containing the 'phrase' parameter to the plugin's AJAX URL. 3. Using WP-CLI or plugin management tools to check the installed plugin version: `wp plugin list --status=active | grep ymc-smart-filter` or `wp plugin get ymc-smart-filter --field=version` to confirm if the plugin is outdated and vulnerable. [2]
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update the Filter & Grids (ymc-smart-filter) WordPress plugin to version 3.2.1 or later, where the vulnerability has been fixed by properly sanitizing and preparing SQL queries and improving nonce verification in AJAX handlers. If updating immediately is not possible, consider disabling the plugin temporarily to prevent exploitation. Additionally, ensure that your WordPress installation and plugins are kept up to date and monitor your site for suspicious activity related to SQL injection attempts. [2]
Can you explain this vulnerability to me?
This vulnerability is an SQL Injection in the Filter & Grids plugin for WordPress, affecting all versions up to 3.2.0. It occurs because the 'phrase' parameter is not properly escaped or prepared in SQL queries, allowing unauthenticated attackers to inject additional SQL commands. This can lead to extraction of sensitive information from the database. The issue specifically affects MariaDB databases, as the injection causes syntax errors on MySQL.
How can this vulnerability impact me? :
The vulnerability can allow unauthenticated attackers to extract sensitive information from the database by injecting malicious SQL queries. This can lead to data breaches, exposing confidential data stored in the WordPress site using the Filter & Grids plugin with MariaDB.