Plataforma
wordpress
Componente
miraculous
Corrigido em
2.0.10
CVE-2025-58628 identifies a SQL Injection vulnerability within the Miraculous WordPress theme. This flaw allows attackers to potentially extract sensitive data through blind SQL injection techniques. The vulnerability impacts versions ranging from 0.0.0 to 2.0.9, and a fix is available in version 2.0.10.
The SQL Injection vulnerability in Miraculous theme allows an attacker to bypass authentication and directly query the database. Successful exploitation could lead to unauthorized access to user credentials, sensitive configuration data, and potentially even the entire WordPress database. The 'blind' nature of the injection means the attacker doesn't see the results of each query immediately, requiring iterative probing to extract data, but the potential impact remains severe. This is similar to other SQL injection vulnerabilities where attackers can gain full control over the database server.
CVE-2025-58628 was publicly disclosed on 2025-09-05. The vulnerability is considered high probability due to the ease of exploitation and the potential impact. No public proof-of-concept (POC) code has been released at the time of writing, but the vulnerability's nature makes it likely that a POC will emerge. It is not currently listed on the CISA KEV catalog.
Websites using the Miraculous WordPress theme, particularly those running older, unpatched versions (0.0.0–2.0.9), are at significant risk. Shared hosting environments where multiple websites share the same database are especially vulnerable, as a compromise of one site could potentially expose data from others.
• wordpress / composer / npm:
grep -r "SELECT .* FROM" /var/www/html/wp-content/themes/miraculous/includes/• generic web: ```bash curl -I https://your-wordpress-site.com/wp-admin/admin.php?page=miraculous-settings&action=updateoption&optionname=some_input' --header "X-Custom-Header: \""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""
disclosure
patch
Status do Exploit
EPSS
0.03% (percentil 10%)
CISA SSVC
Vetor CVSS
The primary mitigation for CVE-2025-58628 is to immediately upgrade the Miraculous WordPress theme to version 2.0.10 or later. If upgrading is not immediately possible due to compatibility issues or breaking changes, consider implementing a Web Application Firewall (WAF) rule to filter potentially malicious SQL injection attempts targeting the vulnerable endpoints. Specifically, look for unusual characters and patterns in user input that are commonly used in SQL injection attacks. Regularly review WordPress plugin security best practices to prevent similar vulnerabilities in the future. After upgrade, verify the fix by attempting a SQL injection attack on the vulnerable endpoint and confirming that it is blocked.
Actualice el tema Miraculous a la versión 2.0.10 o superior para mitigar la vulnerabilidad de inyección SQL. Asegúrese de realizar una copia de seguridad completa de su sitio web antes de actualizar cualquier tema o plugin. Verifique que su base de datos esté correctamente configurada y protegida contra inyecciones SQL.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2025-58628 is a critical SQL Injection vulnerability affecting the Miraculous WordPress theme, allowing attackers to potentially extract sensitive data from the database.
You are affected if your WordPress site uses the Miraculous theme in versions 0.0.0 through 2.0.9. Upgrade to 2.0.10 or later to mitigate the risk.
Upgrade the Miraculous WordPress theme to version 2.0.10 or later. Consider implementing a WAF as a temporary workaround if immediate upgrade is not possible.
While no active exploitation has been confirmed, the vulnerability's ease of exploitation suggests it may be targeted soon.
Refer to the official Miraculous theme documentation or website for the latest security advisory regarding CVE-2025-58628.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.