CRITICALCVE-2025-54707CVSS 9.3

WordPress MDTF Plugin <= 1.3.3.7 - SQL Injection Vulnerability

wordt vertaald…

Platform

wordpress

Component

wp-meta-data-filter-and-taxonomy-filter

Opgelost in

1.3.4

AI Confidence: highNVDEPSS 0.0%Beoordeeld: mei 2026
Wordt vertaald naar uw taal…

CVE-2025-54707 describes a SQL Injection vulnerability discovered in the MDTF WordPress plugin. This flaw allows attackers to inject malicious SQL code, potentially gaining unauthorized access to sensitive data and compromising the entire WordPress installation. The vulnerability affects versions from 0.0.0 up to and including 1.3.3.7, with a fix available in version 1.3.4.

WordPress

Detecteer deze CVE in je project

Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.

Impact en Aanvalsscenarioswordt vertaald…

Successful exploitation of this SQL Injection vulnerability could grant an attacker complete control over the WordPress database. This includes the ability to read, modify, or delete any data stored within the database, such as user credentials, sensitive configuration information, and customer data. An attacker could also leverage this vulnerability to execute arbitrary commands on the server, leading to a full system compromise. The potential blast radius extends to any data accessible through the WordPress database, and could impact website visitors and administrators.

Uitbuitingscontextwordt vertaald…

CVE-2025-54707 was published on 2025-08-14. The vulnerability's severity is considered critical due to the potential for complete system compromise. Public proof-of-concept exploits are currently unknown, but the SQL Injection nature of the vulnerability makes it likely that exploits will emerge. Monitor security advisories and threat intelligence feeds for updates.

Wie Loopt Risicowordt vertaald…

Websites using the MDTF WordPress plugin, particularly those with sensitive data stored in their WordPress database, are at significant risk. Shared hosting environments where multiple WordPress installations share the same database are also at increased risk, as a compromise of one site could potentially impact others.

Detectiestappenwordt vertaald…

• wordpress / composer / npm:

grep -r "wp_query('SELECT * FROM" /var/www/html/wp-content/plugins/mdtf/

• generic web:

curl -I https://your-wordpress-site.com/wp-admin/admin.php?page=mdtf-settings&action=update_options | grep SQL

Aanvalstijdlijn

  1. Disclosure

    disclosure

Dreigingsinformatie

Exploit Status

Proof of ConceptOnbekend
CISA KEVNO
InternetblootstellingHoog

EPSS

0.04% (11% percentiel)

CISA SSVC

Exploitatienone
Automatiseerbaaryes
Technische Impactpartial

CVSS-vector

DREIGINGSINFORMATIE· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L9.3CRITICALAttack VectorNetworkHoe de aanvaller het doel bereiktAttack ComplexityLowVereiste omstandigheden om te exploiterenPrivileges RequiredNoneVereist authenticatieniveau voor aanvalUser InteractionNoneOf het slachtoffer actie moet ondernemenScopeChangedImpact buiten het getroffen onderdeelConfidentialityHighRisico op blootstelling van gevoelige dataIntegrityNoneRisico op ongeautoriseerde gegevenswijzigingAvailabilityLowRisico op verstoring van dienstennextguardhq.com · CVSS v3.1 Basisscore
Wat betekenen deze metrics?
Attack Vector
Netwerk — op afstand uitbuitbaar via internet. Geen fysieke of lokale toegang vereist.
Attack Complexity
Laag — geen speciale voorwaarden vereist. Betrouwbaar uitbuitbaar.
Privileges Required
Geen — geen authenticatie vereist om te exploiteren.
User Interaction
Geen — automatische en stille aanval. Slachtoffer doet niets.
Scope
Gewijzigd — aanval kan voorbij het kwetsbare component uitbreiden naar andere systemen.
Confidentiality
Hoog — volledig verlies van vertrouwelijkheid. Aanvaller kan alle gegevens lezen.
Integrity
Geen — geen integriteitsimpact.
Availability
Laag — gedeeltelijke of intermitterende denial of service.

Getroffen Software

Componentwp-meta-data-filter-and-taxonomy-filter
LeverancierRealMag777
Getroffen bereikOpgelost in
0.0.0 – 1.3.3.71.3.4

Pakketinformatie

Actieve installaties
1KNiche
Plugin-beoordeling
4.5
Vereist WordPress
4.1.0+
Compatibel tot
7.0
Vereist PHP
7.4+

Zwakheidsclassificatie (CWE)

Tijdlijn

  1. Gereserveerd
  2. Gepubliceerd
  3. Gewijzigd
  4. EPSS bijgewerkt

Mitigatie en Workaroundswordt vertaald…

The primary mitigation for CVE-2025-54707 is to immediately upgrade the MDTF WordPress plugin to version 1.3.4 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing a Web Application Firewall (WAF) rule to filter out potentially malicious SQL injection attempts targeting the vulnerable endpoints. Additionally, review and restrict database user permissions to minimize the impact of a successful attack. After upgrading, confirm the vulnerability is resolved by attempting a SQL injection payload against the affected endpoints and verifying that it is properly sanitized.

Hoe te verhelpenwordt vertaald…

Actualice el plugin MDTF a la última versión disponible para mitigar la vulnerabilidad de inyección SQL.  Verifique la página del plugin en wordpress.org para obtener las actualizaciones más recientes y siga las instrucciones de instalación proporcionadas por el desarrollador.  Asegúrese de realizar una copia de seguridad de su sitio web antes de realizar cualquier actualización.

CVE Beveiligingsnieuwsbrief

Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.

Veelgestelde vragenwordt vertaald…

What is CVE-2025-54707 — SQL Injection in MDTF WordPress Plugin?

CVE-2025-54707 is a critical SQL Injection vulnerability affecting the MDTF WordPress plugin, allowing attackers to inject malicious SQL code and potentially compromise the database.

Am I affected by CVE-2025-54707 in MDTF WordPress Plugin?

If you are using MDTF WordPress plugin versions 0.0.0 through 1.3.3.7, you are affected by this vulnerability. Check your plugin version and upgrade immediately.

How do I fix CVE-2025-54707 in MDTF WordPress Plugin?

Upgrade the MDTF WordPress plugin to version 1.3.4 or later to remediate the SQL Injection vulnerability. Consider WAF rules as a temporary workaround.

Is CVE-2025-54707 being actively exploited?

While no active exploitation has been confirmed, the SQL Injection nature of the vulnerability makes it likely that exploits will emerge. Monitor security advisories.

Where can I find the official MDTF advisory for CVE-2025-54707?

Refer to the MDTF plugin developer's website or WordPress plugin repository for the official advisory and update information.

Is jouw project getroffen?

Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.