CVE-2025-23780
Published: 16 January 2025
Summary
CVE-2025-23780 is a high-severity SQL Injection (CWE-89) vulnerability. Its CVSS base score is 7.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 39.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires information input validation mechanisms at entry points to neutralize special elements used in SQL commands, comprehensively preventing SQL injection exploits like CVE-2025-23780.
Mandates timely identification, reporting, and correction of flaws, enabling patching of the SQL injection vulnerability in the Easy Code Snippets plugin.
Conducts vulnerability scanning and monitoring to identify SQL injection vulnerabilities like CVE-2025-23780 in plugins for subsequent remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing WordPress plugin enables T1190 for exploitation of the application and facilitates T1213.006 for unauthorized database data extraction.
NVD Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Alpha BPO Easy Code Snippets easy-code-snippets allows SQL Injection.This issue affects Easy Code Snippets: from n/a through <= 1.0.2.
Deeper analysisAI
CVE-2025-23780 is an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability, classified under CWE-89, affecting the Easy Code Snippets WordPress plugin developed by Alpha BPO. The issue impacts all versions of the plugin from n/a through 1.0.2 and was published on 2025-01-16.
The vulnerability carries a CVSS v3.1 base score of 7.6 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L). High-privileged users, such as administrators, can exploit it remotely over the network with low attack complexity and no user interaction required. Successful exploitation enables high-impact confidentiality violations, such as unauthorized data extraction from the database, alongside low availability disruption and scope change to other resources.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/easy-code-snippets/vulnerability/wordpress-easy-code-snippets-plugin-1-0-2-sql-injection-vulnerability?_s_id=cve.
Details
- CWE(s)