CVE-2025-68017
Published: 22 January 2026
Summary
CVE-2025-68017 is a high-severity SQL Injection (CWE-89) vulnerability. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct SQL injection flaw in public-facing WordPress plugin enables T1190 exploitation for unauthenticated remote access; facilitates T1213 data extraction from backend database repositories via blind SQLi.
NVD Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Antideo Antideo Email Validator antideo-email-validator allows Blind SQL Injection.This issue affects Antideo Email Validator: from n/a through <= 1.0.10.
Deeper analysisAI
CVE-2025-68017 is an Improper Neutralization of Special Elements used in an SQL Command vulnerability, classified as CWE-89, that enables Blind SQL Injection in the Antideo Email Validator WordPress plugin (antideo-email-validator). This issue affects all versions of the plugin from n/a through 1.0.10. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L), indicating network accessibility with high attack complexity but no privileges or user interaction required.
Remote, unauthenticated attackers can exploit this vulnerability over the network by crafting malicious inputs that manipulate SQL queries in the plugin. Exploitation allows attackers to achieve high-impact confidentiality violations, such as extracting sensitive data from the database through blind SQL injection techniques, alongside low-impact availability disruption. The changed scope (S:C) suggests potential effects beyond the vulnerable component.
The Patchstack advisory provides details on this WordPress plugin vulnerability, including mitigation guidance, accessible at https://patchstack.com/database/Wordpress/Plugin/antideo-email-validator/vulnerability/wordpress-antideo-email-validator-plugin-1-0-10-sql-injection-vulnerability?_s_id=cve.
Details
- CWE(s)