Platform
wordpress
Component
whatscart-for-woocommerce
Fixed in
1.1.1
CVE-2025-31056 identifies a SQL Injection vulnerability within the WhatsCart plugin for WooCommerce. This flaw allows attackers to inject malicious SQL code, potentially leading to unauthorized data access and manipulation. The vulnerability impacts versions 0.0 through 1.1.0 of WhatsCart. A patch has been released in version 1.1.1.
Successful exploitation of this SQL Injection vulnerability could grant an attacker complete control over the WooCommerce database. This includes the ability to read, modify, or delete sensitive customer data such as usernames, passwords, addresses, and payment information. Furthermore, an attacker could potentially gain administrative access to the WooCommerce store, enabling them to modify products, orders, and other critical configurations. The blast radius extends to all users of the affected WooCommerce store, and the potential for data breaches and financial loss is significant. This vulnerability shares similarities with other SQL Injection exploits where attackers leverage database queries to bypass authentication and escalate privileges.
CVE-2025-31056 was publicly disclosed on 2025-05-23. The vulnerability's severity is considered high due to the potential for complete database compromise. Currently, there are no publicly available proof-of-concept exploits, but the ease of SQL Injection exploitation suggests a high probability of exploitation if left unpatched. The vulnerability is not currently listed on the CISA KEV catalog.
Exploit Status
EPSS
0.23% (46% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2025-31056 is to immediately upgrade the WhatsCart plugin to version 1.1.1 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing a Web Application Firewall (WAF) with rules to filter out potentially malicious SQL queries targeting the vulnerable endpoints. Additionally, review and restrict database user permissions to minimize the impact of a successful attack. Monitor database logs for suspicious SQL queries that may indicate an ongoing attack. There are no specific Sigma or YARA rules available for this particular vulnerability at this time.
Update the WhatsCart plugin to the latest available version to resolve the SQL Injection vulnerability. Check the plugin page on WordPress.org for the latest version and update instructions. Additionally, ensure that the WordPress core and other plugins are kept up to date to reduce the risk of future vulnerabilities.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2025-31056 is a critical SQL Injection vulnerability affecting WhatsCart for WooCommerce versions 0.0 through 1.1.0, allowing attackers to inject malicious SQL code and potentially compromise the database.
If you are using WhatsCart for WooCommerce version 0.0 to 1.1.0, you are affected by this vulnerability and must upgrade immediately.
Upgrade WhatsCart for WooCommerce to version 1.1.1 or later to resolve the SQL Injection vulnerability. Consider implementing a WAF as an interim measure.
While no public exploits are currently available, the ease of SQL Injection exploitation suggests a high probability of exploitation if left unpatched.
Refer to the official WhatsCart documentation and support channels for the latest advisory and updates regarding CVE-2025-31056.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.