Platform
wordpress
Component
directiq-wp
Fixed in
2.0.1
CVE-2025-52829 identifies a SQL Injection vulnerability within DirectIQ Email Marketing, a WordPress plugin. This flaw allows attackers to inject malicious SQL code, potentially gaining unauthorized access to sensitive data and compromising the entire system. The vulnerability impacts versions from 0.0.0 up to and including 2.0, with a fix available in version 2.0.1.
Successful exploitation of this SQL Injection vulnerability could grant an attacker complete control over the DirectIQ Email Marketing database. This includes the ability to read, modify, or delete any data stored within the database, such as user credentials, email lists, and campaign data. Furthermore, depending on the database configuration and WordPress setup, an attacker could potentially leverage this vulnerability for lateral movement within the broader network, accessing other systems and data. The blast radius extends to any sensitive information managed by DirectIQ Email Marketing, making it a high-priority security concern.
CVE-2025-52829 was publicly disclosed on 2025-06-27. The vulnerability's severity is high due to the potential for complete data compromise. While no public proof-of-concept (PoC) code has been released at the time of writing, the ease of SQL Injection exploitation suggests a high probability of exploitation if the vulnerability remains unpatched. It is not currently listed on the CISA KEV catalog.
Exploit Status
EPSS
0.06% (18% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2025-52829 is to immediately upgrade DirectIQ Email Marketing to version 2.0.1 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing temporary workarounds. These may include restricting database user permissions to the minimum necessary for DirectIQ Email Marketing's operation and implementing a Web Application Firewall (WAF) with rules to detect and block SQL Injection attempts targeting the plugin's endpoints. After upgrading, verify the fix by attempting a SQL Injection attack on the vulnerable endpoints and confirming that the input is properly sanitized.
Update the DirectIQ Email Marketing plugin to the latest available version to mitigate the SQL Injection vulnerability. Check for updates in the WordPress repository or contact the developer for more information about the patched version. Implement additional security measures, such as user input validation and sanitization, to prevent future vulnerabilities.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2025-52829 is a critical SQL Injection vulnerability affecting DirectIQ Email Marketing versions 0.0.0 through 2.0, allowing attackers to inject malicious SQL code.
If you are using DirectIQ Email Marketing versions 0.0.0 to 2.0, you are vulnerable. Upgrade to 2.0.1 or later to mitigate the risk.
Upgrade DirectIQ Email Marketing to version 2.0.1 or later. As a temporary workaround, restrict database user permissions and consider a WAF.
While no active exploitation has been confirmed, the ease of exploitation suggests a high probability if the vulnerability remains unpatched.
Please refer to the DirectIQ website or WordPress plugin repository for the official advisory and update information.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.