CRITICALCVE-2025-31911CVSS 9.3

WordPress Social Share And Social Locker plugin <= 1.4.2 - SQL Injection vulnerability

翻译中…

平台

wordpress

组件

social-share-and-social-locker-arsocial

修复版本

1.4.3

AI Confidence: highNVDEPSS 0.2%已审阅: 2026年5月
正在翻译为您的语言…

CVE-2025-31911 describes a critical SQL Injection vulnerability discovered in the Social Share And Social Locker WordPress plugin. This flaw allows attackers to perform blind SQL injection, potentially leading to unauthorized data access and manipulation. The vulnerability affects versions from 0 up to and including 1.4.2, and a patch is available in version 1.4.3.

WordPress

检测此 CVE 是否影响你的项目

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。

影响与攻击场景翻译中…

The SQL Injection vulnerability in Social Share And Social Locker allows attackers to bypass security measures and directly interact with the underlying database. Due to the 'blind' nature of the injection, attackers must infer data through multiple queries, making exploitation potentially time-consuming but still highly impactful. Successful exploitation could lead to the extraction of sensitive user data, including usernames, passwords, email addresses, and potentially even financial information if the plugin handles such data. Furthermore, an attacker could modify database records, leading to data corruption or denial of service. This vulnerability shares characteristics with other SQL injection flaws, where attackers leverage malformed SQL queries to gain unauthorized access.

利用背景翻译中…

CVE-2025-31911 was publicly disclosed on 2025-04-03. The vulnerability's severity is high due to the potential for data exfiltration and modification. Currently, there are no known public exploits or active campaigns targeting this specific vulnerability, but the blind SQL injection nature means exploitation is possible. It is not listed on the CISA KEV catalog as of this writing.

哪些人处于风险中翻译中…

WordPress websites utilizing the Social Share And Social Locker plugin, particularly those running versions 0 through 1.4.2, are at significant risk. Shared hosting environments where multiple websites share the same database are especially vulnerable, as a compromise of one site could potentially expose data from others.

检测步骤翻译中…

• wordpress / composer / npm:

grep -r "reputeinfosystems/social-share-and-social-locker" wp-content/plugins/

• wordpress / composer / npm:

wp plugin list | grep "Social Share And Social Locker"

• generic web:

curl -I https://your-wordpress-site.com/wp-content/plugins/social-share-and-social-locker/ | grep -i "SQL"

• generic web: Review WordPress access logs for unusual SQL query patterns originating from the plugin’s endpoints.

攻击时间线

  1. Disclosure

    disclosure

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

0.23% (46% 百分位)

CISA SSVC

利用情况none
可自动化yes
技术影响total

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L9.3CRITICALAttack VectorNetwork攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredNone攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeChanged超出受影响组件的影响范围ConfidentialityHigh敏感数据泄露风险IntegrityNone数据未授权篡改风险AvailabilityLow服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
无 — 无需认证,无需凭证即可利用。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
已改变 — 攻击可以超出脆弱组件,影响其他系统。
Confidentiality
高 — 完全丧失机密性,攻击者可读取所有数据。
Integrity
无 — 无完整性影响。
Availability
低 — 部分或间歇性拒绝服务。

受影响的软件

组件social-share-and-social-locker-arsocial
供应商reputeinfosystems
影响范围修复版本
0 – 1.4.21.4.3

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. 修改日期
  4. EPSS 更新日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2025-31911 is to immediately upgrade the Social Share And Social Locker plugin to version 1.4.3 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider temporarily disabling the plugin to prevent exploitation. While a direct WAF rule is difficult to implement for blind SQL injection, implementing a WAF rule that blocks suspicious SQL query patterns targeting the plugin's endpoints could offer some protection. Monitor WordPress access logs for unusual SQL query patterns originating from the plugin’s endpoints. After upgrading, confirm the vulnerability is resolved by attempting a test SQL injection query through the plugin’s functionality and verifying that it is properly sanitized.

修复方法翻译中…

Actualice el plugin Social Share And Social Locker a la última versión disponible para mitigar la vulnerabilidad de inyección SQL ciega.  Verifique las actualizaciones en el repositorio de WordPress o contacte al desarrollador para obtener más información sobre la versión corregida.  Implemente medidas de seguridad adicionales, como la validación y el saneamiento de las entradas del usuario, para prevenir futuras vulnerabilidades.

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2025-31911 — SQL Injection in Social Share And Social Locker?

CVE-2025-31911 is a critical SQL Injection vulnerability affecting versions 0–1.4.2 of the Social Share And Social Locker WordPress plugin, allowing attackers to extract data via blind SQL injection.

Am I affected by CVE-2025-31911 in Social Share And Social Locker?

If your WordPress site uses Social Share And Social Locker version 0 through 1.4.2, you are vulnerable to this SQL Injection flaw. Upgrade immediately.

How do I fix CVE-2025-31911 in Social Share And Social Locker?

Upgrade the Social Share And Social Locker plugin to version 1.4.3 or later to resolve this vulnerability. If upgrading is not possible, temporarily disable the plugin.

Is CVE-2025-31911 being actively exploited?

As of now, there are no confirmed active exploitation campaigns targeting CVE-2025-31911, but the blind SQL injection nature makes exploitation possible.

Where can I find the official Social Share And Social Locker advisory for CVE-2025-31911?

Refer to the plugin developer's website or WordPress plugin repository for the official advisory and update information regarding CVE-2025-31911.

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。