CVE-2025-26988
Published: 03 March 2025
Summary
CVE-2025-26988 is a critical-severity SQL Injection (CWE-89) vulnerability in Cozyvision Sms Alert Order Notifications. Its CVSS base score is 9.3 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation and sanitization of inputs to prevent SQL injection attacks like CVE-2025-26988 in the SMS Alert plugin.
Mandates timely remediation of identified flaws, ensuring patching of the vulnerable Cozy Vision SMS Alert plugin versions up to 3.7.8.
Enables vulnerability scanning to identify SQL injection issues such as CVE-2025-26988 in WordPress plugins and initiate remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing WordPress plugin enables remote unauthenticated exploitation (T1190) and direct unauthorized database data extraction (T1213.006).
NVD Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozy Vision SMS Alert Order Notifications sms-alert allows SQL Injection.This issue affects SMS Alert Order Notifications: from n/a through <= 3.7.8.
Deeper analysisAI
CVE-2025-26988 is an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability, classified under CWE-89, affecting the Cozy Vision SMS Alert Order Notifications WordPress plugin (sms-alert). This issue impacts all versions from n/a through 3.7.8, specifically within the WooCommerce integration for SMS order notifications.
The vulnerability enables exploitation by unauthenticated remote attackers (AV:N/AC:L/PR:N/UI:N) over the network with low attack complexity and no user interaction required. Exploitation leads to a scoped impact (S:C) with high confidentiality consequences (C:H), such as unauthorized data extraction from the database, alongside low availability disruption (A:L), resulting in a CVSS v3.1 base score of 9.3.
The Patchstack advisory provides details on the vulnerability and mitigation, available at https://patchstack.com/database/Wordpress/Plugin/sms-alert/vulnerability/wordpress-sms-alert-order-notifications-woocommerce-plugin-3-7-8-sql-injection-vulnerability?_s_id=cve.
Details
- CWE(s)