CVE-2026-25377
Received Received - Intake
SQL Injection in eyecix Addon Jobsearch Chat

Publication date: 2026-03-25

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in eyecix Addon Jobsearch Chat addon-jobsearch-chat allows SQL Injection.This issue affects Addon Jobsearch Chat: from n/a through <= 3.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2026-03-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
eyecix addon_jobsearch_chat to 3.0 (inc)
patchstack addon_jobsearch_chat to 3.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability is an SQL Injection in the WordPress Addon Jobsearch Chat Plugin versions up to 3.0, allowing unauthenticated attackers to execute arbitrary SQL commands.

To detect this vulnerability on your system, you should first verify if the vulnerable plugin version (≀ 3.0) is installed.

You can check the installed plugin version on your WordPress site by running the following WP-CLI command:

  • wp plugin list --status=active

Look for 'addon-jobsearch-chat' in the output and check its version. If it is version 3.0 or lower, the site is vulnerable.

For network detection, monitoring for suspicious SQL injection attempts targeting the plugin endpoints can help. You can use web application firewall (WAF) logs or intrusion detection systems (IDS) to look for unusual HTTP requests containing SQL syntax or payloads attempting to exploit the plugin.

Patchstack provides mitigation rules that can be deployed to block exploitation attempts until the plugin is updated.

No specific detection commands are provided in the resources, but general SQL injection detection tools or scanners targeting WordPress plugins can be used.


Can you explain this vulnerability to me?

CVE-2026-25377 is a high-severity SQL Injection vulnerability found in the WordPress Addon Jobsearch Chat Plugin versions up to and including 3.0.

This vulnerability allows unauthenticated attackers to execute arbitrary SQL commands on the plugin's database by improperly neutralizing special elements used in SQL commands.

As a result, attackers can directly interact with the database, potentially leading to data theft or unauthorized manipulation of data.

The issue is classified under the OWASP Top 10 category A3: Injection and has a CVSS score of 9.3, indicating it is highly dangerous.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized access to sensitive data stored in the plugin's database.

Attackers can steal data or manipulate the database without any authentication, which can compromise the integrity and confidentiality of your website's data.

Because the vulnerability is exploitable by unauthenticated users, it can be targeted in mass campaigns affecting many websites regardless of their traffic or popularity.

If exploited, it can lead to data breaches, loss of user trust, and potential damage to your website's functionality.


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to update the WordPress Addon Jobsearch Chat Plugin to version 3.1 or later, where the issue is resolved.

For users who cannot update immediately, Patchstack provides mitigation rules that block exploitation attempts until the patch can be applied.

Applying these mitigation rules or updating the plugin promptly is strongly advised to prevent exploitation of this high-severity SQL Injection vulnerability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The SQL Injection vulnerability in the Addon Jobsearch Chat plugin allows unauthenticated attackers to execute arbitrary SQL commands, potentially leading to data theft or unauthorized manipulation of the database.

Such unauthorized access and data breaches can result in non-compliance with common data protection standards and regulations like GDPR and HIPAA, which require the protection of personal and sensitive data from unauthorized access and breaches.

Therefore, if exploited, this vulnerability could lead to violations of these regulations due to compromised data confidentiality and integrity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart