Cyber Posture

CVE-2025-1648

HighPublic PoC

Published: 25 February 2025

Published
25 February 2025
Modified
28 February 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0101 77.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1648 is a high-severity SQL Injection (CWE-89) vulnerability in Yawave Yawave. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 22.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly counters SQL injection by requiring validation and sanitization of user-supplied inputs like the 'lbid' parameter to prevent query manipulation.

prevent

Mandates timely flaw remediation, such as patching the Yawave plugin to fix the insufficient escaping and preparation in versions up to 2.9.1.

detect

Requires vulnerability scanning to identify the SQL injection flaw in the Yawave plugin, enabling proactive remediation before exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Direct unauthenticated SQL injection in public-facing WordPress plugin enables remote exploitation of web application for database data access.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Yawave plugin for WordPress is vulnerable to SQL Injection via the 'lbid' parameter in all versions up to, and including, 2.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL…

more

query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Deeper analysisAI

CVE-2025-1648 is a SQL injection vulnerability (CWE-89) in the Yawave plugin for WordPress, affecting all versions up to and including 2.9.1. The issue stems from insufficient escaping of the user-supplied 'lbid' parameter and lack of sufficient preparation in the existing SQL query, published on 2025-02-25 with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction. By appending additional SQL queries to existing ones via the 'lbid' parameter, they can extract sensitive information from the database.

Advisories provide further details on mitigation, including Atvik Security's report on the unauthenticated SQL injection, the vulnerable code in the WordPress plugin Trac at shortcode.liveblog.php line 69, and Wordfence threat intelligence.

Details

CWE(s)

Affected Products

yawave
yawave
≤ 2.9.1

CVEs Like This One

CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89
CVE-2026-32458Shared CWE-89
CVE-2026-24494Shared CWE-89
CVE-2025-26875Shared CWE-89
CVE-2026-26263Shared CWE-89
CVE-2026-30531Shared CWE-89
CVE-2025-7636Shared CWE-89
CVE-2026-35614Shared CWE-89
CVE-2025-30810Shared CWE-89

References