CVE-2025-69310
Blind SQL Injection in Woodly Core Plugin
Publication date: 2026-02-20
Last updated on: 2026-02-24
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| patchstack | woodly_core | to 1.4 (inc) |
| teconce | woodly_core | to 1.4 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-69310 is a high-priority SQL Injection vulnerability affecting the WordPress Woodly Core Plugin versions up to and including 1.4.
This vulnerability allows unauthenticated attackers to execute arbitrary SQL queries directly on the database.
It is classified as a Blind SQL Injection, meaning attackers can manipulate the database without directly seeing the results of their queries.
How can this vulnerability impact me? :
This vulnerability can lead to serious impacts including data theft and other malicious interactions with the database.
Because the vulnerability requires no authentication, attackers can exploit it remotely without any privileges.
The high CVSS score of 9.3 indicates a critical risk and a high likelihood of exploitation, potentially compromising the confidentiality, integrity, and availability of your data.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability allows unauthenticated attackers to execute arbitrary SQL queries on the database via the WordPress Woodly Core Plugin versions up to 1.4. Detection typically involves monitoring for unusual or suspicious SQL query patterns or HTTP requests targeting the vulnerable plugin endpoints.
While no specific commands are provided in the available resources, common detection methods include using web application firewalls (WAFs) with rules targeting SQL injection attempts, analyzing web server logs for suspicious query strings, and employing vulnerability scanners that can test for SQL injection in the Woodly Core plugin.
What immediate steps should I take to mitigate this vulnerability?
Since no official patch is currently available for this vulnerability, the immediate recommended mitigation is to implement Patchstackβs automatic blocking rule, which can block attacks targeting this SQL injection flaw.
- Apply Patchstackβs mitigation rule immediately to prevent exploitation.
- Monitor for official updates or patches from the Woodly Core plugin developers.
- Consider using a web application firewall (WAF) to help block SQL injection attempts.