CVE-2025-68865
Published: 05 January 2026
Summary
CVE-2025-68865 is a critical-severity SQL Injection (CWE-89) vulnerability. Its CVSS base score is 9.3 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 17.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires information input validation to neutralize special elements in SQL commands, comprehensively preventing SQL injection in web plugins like Infility Global.
Mandates timely identification, reporting, and correction of flaws, enabling patching of the specific SQL injection vulnerability in Infility Global versions through <=2.15.11.
Vulnerability scanning identifies SQL injection vulnerabilities such as CVE-2025-68865 in WordPress plugins prior to exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL Injection in a remotely accessible WordPress plugin directly enables exploitation of a public-facing web application for data access.
NVD Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Infility Infility Global infility-global allows SQL Injection.This issue affects Infility Global: from n/a through <= 2.15.11.
Deeper analysisAI
CVE-2025-68865 is an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability, classified under CWE-89, affecting the Infility Global (infility-global) WordPress plugin. This issue impacts all versions from n/a through 2.15.11. The vulnerability was published on 2026-01-05T11:17:42.267 and carries a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L), indicating critical severity due to its network accessibility and high confidentiality impact.
Remote attackers require no privileges, user interaction, or special conditions beyond network access to exploit the SQL Injection flaw. Successful exploitation enables high-impact confidentiality breaches, such as extracting sensitive data from the database, alongside low availability disruption and a changed scope that may affect broader system components.
Patchstack provides details on the vulnerability via its advisory at https://patchstack.com/database/Wordpress/Plugin/infility-global/vulnerability/wordpress-infility-global-plugin-2-14-38-sql-injection-vulnerability?_s_id=cve, which covers the issue in affected plugin versions and implies mitigation through applying available updates or alternative hardening measures.
Details
- CWE(s)