Plateforme
wordpress
Composant
whatscart-for-woocommerce
Corrigé dans
1.1.1
CVE-2025-31056 identifies a SQL Injection vulnerability within the WhatsCart plugin for WooCommerce. This flaw allows attackers to inject malicious SQL code, potentially leading to unauthorized data access and manipulation. The vulnerability impacts versions 0.0 through 1.1.0 of WhatsCart. A patch has been released in version 1.1.1.
Successful exploitation of this SQL Injection vulnerability could grant an attacker complete control over the WooCommerce database. This includes the ability to read, modify, or delete sensitive customer data such as usernames, passwords, addresses, and payment information. Furthermore, an attacker could potentially gain administrative access to the WooCommerce store, enabling them to modify products, orders, and other critical configurations. The blast radius extends to all users of the affected WooCommerce store, and the potential for data breaches and financial loss is significant. This vulnerability shares similarities with other SQL Injection exploits where attackers leverage database queries to bypass authentication and escalate privileges.
CVE-2025-31056 was publicly disclosed on 2025-05-23. The vulnerability's severity is considered high due to the potential for complete database compromise. Currently, there are no publicly available proof-of-concept exploits, but the ease of SQL Injection exploitation suggests a high probability of exploitation if left unpatched. The vulnerability is not currently listed on the CISA KEV catalog.
WooCommerce store owners utilizing the WhatsCart plugin, particularly those running versions 0.0 through 1.1.0, are at significant risk. Shared hosting environments where multiple WordPress installations share the same database are especially vulnerable, as a compromise of one site could potentially affect others. Stores that have not implemented robust database security practices or regularly update their plugins are also at increased risk.
• wordpress / composer / npm:
grep -r "SELECT .* FROM" /var/www/html/wp-content/plugins/whatscart-for-woocommerce/• generic web:
curl -I https://your-wordpress-site.com/wp-content/plugins/whatscart-for-woocommerce/ | grep SQL• wordpress / composer / npm:
wp plugin list --status=inactive | grep whatscart• wordpress / composer / npm:
wp plugin list --status=active | grep whatscartdisclosure
Statut de l'Exploit
EPSS
0.23% (percentile 46%)
CISA SSVC
Vecteur CVSS
The primary mitigation for CVE-2025-31056 is to immediately upgrade the WhatsCart plugin to version 1.1.1 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing a Web Application Firewall (WAF) with rules to filter out potentially malicious SQL queries targeting the vulnerable endpoints. Additionally, review and restrict database user permissions to minimize the impact of a successful attack. Monitor database logs for suspicious SQL queries that may indicate an ongoing attack. There are no specific Sigma or YARA rules available for this particular vulnerability at this time.
Actualice el plugin WhatsCart a la última versión disponible para solucionar la vulnerabilidad de inyección SQL. Verifique la página del plugin en WordPress.org para obtener la versión más reciente y las instrucciones de actualización. Además, asegúrese de mantener actualizado el núcleo de WordPress y otros plugins para reducir el riesgo de futuras vulnerabilidades.
Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.
CVE-2025-31056 is a critical SQL Injection vulnerability affecting WhatsCart for WooCommerce versions 0.0 through 1.1.0, allowing attackers to inject malicious SQL code and potentially compromise the database.
If you are using WhatsCart for WooCommerce version 0.0 to 1.1.0, you are affected by this vulnerability and must upgrade immediately.
Upgrade WhatsCart for WooCommerce to version 1.1.1 or later to resolve the SQL Injection vulnerability. Consider implementing a WAF as an interim measure.
While no public exploits are currently available, the ease of SQL Injection exploitation suggests a high probability of exploitation if left unpatched.
Refer to the official WhatsCart documentation and support channels for the latest advisory and updates regarding CVE-2025-31056.
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.