Cyber Posture

CVE-2025-22350

High

Published: 07 January 2025

Published
07 January 2025
Modified
28 April 2026
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
EPSS Score 0.0007 20.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-22350 is a high-severity SQL Injection (CWE-89) vulnerability. Its CVSS base score is 7.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly prevents SQL injection by requiring validation and sanitization of all inputs used in SQL commands within the vulnerable WordPress plugin.

prevent

SI-2 mandates timely patching and flaw remediation for the specific SQL injection vulnerability in Ultimate Learning Pro versions through 3.9.

preventdetect

SC-7 boundary protection, such as web application firewalls, blocks or detects SQL injection payloads targeting the plugin over the network.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in a publicly accessible WordPress plugin directly enables exploitation of a public-facing web application for unauthorized database data access.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WpIndeed Ultimate Learning Pro allows SQL Injection.This issue affects Ultimate Learning Pro: from n/a through 3.9.

Deeper analysisAI

CVE-2025-22350 is an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability, classified under CWE-89, affecting the WordPress plugin Ultimate Learning Pro by WpIndeed. The issue impacts all versions from n/a through 3.9 and was published on 2025-01-07T17:15:33.093. It carries a CVSS v3.1 base score of 7.6, reflecting network accessibility, low attack complexity, high privileges required, no user interaction, changed scope, high confidentiality impact, no integrity impact, and low availability impact.

High-privileged remote users (PR:H) can exploit this SQL injection vulnerability over the network (AV:N) with low complexity (AC:L) and without requiring user interaction (UI:N). Exploitation enables attackers to achieve high confidentiality impact (C:H), such as extracting sensitive data from the database, alongside low availability disruption (A:L), due to the changed scope (S:C).

Mitigation details are provided in the advisory from Patchstack at https://patchstack.com/database/wordpress/plugin/indeed-learning-pro/vulnerability/wordpress-indeed-ultimate-learning-pro-plugin-3-9-sql-injection-vulnerability?_s_id=cve.

Details

CWE(s)

CVEs Like This One

CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89
CVE-2026-32458Shared CWE-89
CVE-2026-24494Shared CWE-89
CVE-2025-26875Shared CWE-89
CVE-2026-26263Shared CWE-89
CVE-2026-30531Shared CWE-89
CVE-2025-7636Shared CWE-89
CVE-2026-35614Shared CWE-89
CVE-2025-30810Shared CWE-89

References