CVE-2025-1648
Published: 25 February 2025
Summary
CVE-2025-1648 is a high-severity SQL Injection (CWE-89) vulnerability in Yawave Yawave. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 22.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly counters SQL injection by requiring validation and sanitization of user-supplied inputs like the 'lbid' parameter to prevent query manipulation.
Mandates timely flaw remediation, such as patching the Yawave plugin to fix the insufficient escaping and preparation in versions up to 2.9.1.
Requires vulnerability scanning to identify the SQL injection flaw in the Yawave plugin, enabling proactive remediation before exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated SQL injection in public-facing WordPress plugin enables remote exploitation of web application for database data access.
NVD Description
The Yawave plugin for WordPress is vulnerable to SQL Injection via the 'lbid' parameter in all versions up to, and including, 2.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL…
more
query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Deeper analysisAI
CVE-2025-1648 is a SQL injection vulnerability (CWE-89) in the Yawave plugin for WordPress, affecting all versions up to and including 2.9.1. The issue stems from insufficient escaping of the user-supplied 'lbid' parameter and lack of sufficient preparation in the existing SQL query, published on 2025-02-25 with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction. By appending additional SQL queries to existing ones via the 'lbid' parameter, they can extract sensitive information from the database.
Advisories provide further details on mitigation, including Atvik Security's report on the unauthenticated SQL injection, the vulnerable code in the WordPress plugin Trac at shortcode.liveblog.php line 69, and Wordfence threat intelligence.
Details
- CWE(s)