Plataforma
wordpress
Componente
whatscart-for-woocommerce
Corrigido em
1.1.1
CVE-2025-31056 identifies a SQL Injection vulnerability within the WhatsCart plugin for WooCommerce. This flaw allows attackers to inject malicious SQL code, potentially leading to unauthorized data access and manipulation. The vulnerability impacts versions 0.0 through 1.1.0 of WhatsCart. A patch has been released in version 1.1.1.
Successful exploitation of this SQL Injection vulnerability could grant an attacker complete control over the WooCommerce database. This includes the ability to read, modify, or delete sensitive customer data such as usernames, passwords, addresses, and payment information. Furthermore, an attacker could potentially gain administrative access to the WooCommerce store, enabling them to modify products, orders, and other critical configurations. The blast radius extends to all users of the affected WooCommerce store, and the potential for data breaches and financial loss is significant. This vulnerability shares similarities with other SQL Injection exploits where attackers leverage database queries to bypass authentication and escalate privileges.
CVE-2025-31056 was publicly disclosed on 2025-05-23. The vulnerability's severity is considered high due to the potential for complete database compromise. Currently, there are no publicly available proof-of-concept exploits, but the ease of SQL Injection exploitation suggests a high probability of exploitation if left unpatched. The vulnerability is not currently listed on the CISA KEV catalog.
WooCommerce store owners utilizing the WhatsCart plugin, particularly those running versions 0.0 through 1.1.0, are at significant risk. Shared hosting environments where multiple WordPress installations share the same database are especially vulnerable, as a compromise of one site could potentially affect others. Stores that have not implemented robust database security practices or regularly update their plugins are also at increased risk.
• wordpress / composer / npm:
grep -r "SELECT .* FROM" /var/www/html/wp-content/plugins/whatscart-for-woocommerce/• generic web:
curl -I https://your-wordpress-site.com/wp-content/plugins/whatscart-for-woocommerce/ | grep SQL• wordpress / composer / npm:
wp plugin list --status=inactive | grep whatscart• wordpress / composer / npm:
wp plugin list --status=active | grep whatscartdisclosure
Status do Exploit
EPSS
0.23% (percentil 46%)
CISA SSVC
Vetor CVSS
The primary mitigation for CVE-2025-31056 is to immediately upgrade the WhatsCart plugin to version 1.1.1 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing a Web Application Firewall (WAF) with rules to filter out potentially malicious SQL queries targeting the vulnerable endpoints. Additionally, review and restrict database user permissions to minimize the impact of a successful attack. Monitor database logs for suspicious SQL queries that may indicate an ongoing attack. There are no specific Sigma or YARA rules available for this particular vulnerability at this time.
Actualice el plugin WhatsCart a la última versión disponible para solucionar la vulnerabilidad de inyección SQL. Verifique la página del plugin en WordPress.org para obtener la versión más reciente y las instrucciones de actualización. Además, asegúrese de mantener actualizado el núcleo de WordPress y otros plugins para reducir el riesgo de futuras vulnerabilidades.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2025-31056 is a critical SQL Injection vulnerability affecting WhatsCart for WooCommerce versions 0.0 through 1.1.0, allowing attackers to inject malicious SQL code and potentially compromise the database.
If you are using WhatsCart for WooCommerce version 0.0 to 1.1.0, you are affected by this vulnerability and must upgrade immediately.
Upgrade WhatsCart for WooCommerce to version 1.1.1 or later to resolve the SQL Injection vulnerability. Consider implementing a WAF as an interim measure.
While no public exploits are currently available, the ease of SQL Injection exploitation suggests a high probability of exploitation if left unpatched.
Refer to the official WhatsCart documentation and support channels for the latest advisory and updates regarding CVE-2025-31056.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.