CVE-2025-14973
BaseFortify
Publication date: 2026-01-26
Last updated on: 2026-01-26
Assigner: WPScan
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wpzoom | recipe_card_blocks | to 3.4.13 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-14973 is a SQL Injection vulnerability in the WordPress plugin "Recipe Card Blocks" versions before 3.4.13. The plugin does not properly sanitize and escape a parameter before using it in a SQL query, which allows users with Contributor-level permissions or higher to inject malicious SQL code. This can be exploited by crafting a specially designed request that manipulates the SQL query executed by the plugin. [1]
How can this vulnerability impact me? :
This vulnerability can allow attackers with Contributor or higher permissions to perform SQL injection attacks, potentially leading to unauthorized access, data leakage, data modification, or corruption of the database. This can compromise the integrity and confidentiality of the website's data and may allow further exploitation of the system. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by verifying if the installed version of the Recipe Card Blocks Lite WordPress plugin is prior to 3.4.13. Additionally, detection involves checking for suspicious POST requests to the admin-ajax.php endpoint that include the 'recipe_id' parameter with SQL injection payloads. One can inspect the page source in the admin area for the 'ajax_nonce' value associated with 'WPZOOM_Scanner' and monitor or capture POST requests using tools like curl or Burp Suite to see if malicious SQL injection attempts are present. Example command to test injection (replace URL and nonce accordingly): curl -X POST -d "action=wpzoom_scanner&recipe_id=1 AND True&ajax_nonce=YOUR_NONCE" https://yourwordpresssite.com/wp-admin/admin-ajax.php [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the Recipe Card Blocks Lite WordPress plugin to version 3.4.13 or later, where the vulnerability has been fixed. Additionally, restrict Contributor-level user permissions if possible, monitor for suspicious activity involving the 'recipe_id' parameter in POST requests, and consider applying web application firewall (WAF) rules to block SQL injection attempts targeting this plugin. [1]