Overview
This report addresses a significant SQL Injection vulnerability identified in the All in One Minifier plugin for WordPress. It affects all versions up to and including 3.2. The vulnerability is a serious concern as it allows unauthenticated attackers to manipulate SQL queries, potentially leading to system compromise or data leakage.
Vulnerability Summary
CVE ID: CVE-2025-9073
Severity: High (7.5 CVSS Score)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise or data leakage
Affected Products
Product | Affected Versions
All in One Minifier Plugin for WordPress | Up to and including 3.2
How the Exploit Works
The vulnerability arises from the plugin’s lack of proper sanitizing on the ‘post_id’ parameter. This oversight allows attackers to append malicious SQL statements to existing queries. As a result, they can manipulate the database to extract sensitive information.
Conceptual Example Code
An attacker might exploit the vulnerability by sending a specially-crafted HTTP request like this:
POST /wp-json/wp/v2/posts HTTP/1.1
Host: target.example.com
Content-Type: application/json
{ "post_id": "1; SELECT * FROM wp_users;" }
In this conceptual example, `”1; SELECT * FROM wp_users;”` is the malicious payload. It injects an additional SQL statement (`SELECT * FROM wp_users`) into the existing query.
Mitigation Guidance
As a remedial measure, users are advised to apply the vendor patch as soon as it becomes available. In the meantime, employing a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide temporary mitigation. These measures can help detect and block SQL Injection attacks.
