CVE-2025-69310
Awaiting Analysis Awaiting Analysis - Queue
Blind SQL Injection in Woodly Core Plugin

Publication date: 2026-02-20

Last updated on: 2026-02-24

Assigner: Patchstack

Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TeconceTheme Woodly Core woodly-core allows Blind SQL Injection.This issue affects Woodly Core: from n/a through <= 1.4.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-20
Last Modified
2026-02-24
Generated
2026-05-07
AI Q&A
2026-02-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
patchstack woodly_core to 1.4 (inc)
teconce woodly_core to 1.4 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-69310 is a high-priority SQL Injection vulnerability affecting the WordPress Woodly Core Plugin versions up to and including 1.4.

This vulnerability allows unauthenticated attackers to execute arbitrary SQL queries directly on the database.

It is classified as a Blind SQL Injection, meaning attackers can manipulate the database without directly seeing the results of their queries.


How can this vulnerability impact me? :

This vulnerability can lead to serious impacts including data theft and other malicious interactions with the database.

Because the vulnerability requires no authentication, attackers can exploit it remotely without any privileges.

The high CVSS score of 9.3 indicates a critical risk and a high likelihood of exploitation, potentially compromising the confidentiality, integrity, and availability of your data.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability allows unauthenticated attackers to execute arbitrary SQL queries on the database via the WordPress Woodly Core Plugin versions up to 1.4. Detection typically involves monitoring for unusual or suspicious SQL query patterns or HTTP requests targeting the vulnerable plugin endpoints.

While no specific commands are provided in the available resources, common detection methods include using web application firewalls (WAFs) with rules targeting SQL injection attempts, analyzing web server logs for suspicious query strings, and employing vulnerability scanners that can test for SQL injection in the Woodly Core plugin.


What immediate steps should I take to mitigate this vulnerability?

Since no official patch is currently available for this vulnerability, the immediate recommended mitigation is to implement Patchstack’s automatic blocking rule, which can block attacks targeting this SQL injection flaw.

  • Apply Patchstack’s mitigation rule immediately to prevent exploitation.
  • Monitor for official updates or patches from the Woodly Core plugin developers.
  • Consider using a web application firewall (WAF) to help block SQL injection attempts.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart