CVE-2025-5287 Scanner
CVE-2025-5287 Scanner - SQL Injection vulnerability in Likes and Dislikes Plugin
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
1 minute
Time Interval
24 days 11 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
The Likes and Dislikes Plugin is a popular plugin used within the WordPress content management system. It is employed predominantly by website owners who wish to enable users to like or dislike posts, providing interactive features for user engagement. This plugin is available for a variety of websites, from small blogs to larger platforms, aiming to enhance user interaction. It provides a simple integration with existing WordPress sites, requiring minimal configuration from the user. The popularity of this plugin stems from its straightforward functionality and ease of use for both admins and end-users. Typically, this plugin would be used to gather feedback or gauge user sentiment on specific posts.
The SQL Injection vulnerability detected in the Likes and Dislikes Plugin enables attackers to modify SQL queries to extract sensitive data. This vulnerability arises when user inputs are insufficiently sanitized in SQL queries, allowing unauthorized access to backend databases. Such vulnerabilities are severe as they can potentially lead to data breaches or exposure of confidential information. In this particular case, the plugin fails to adequately escape inputs, specifically in the 'post' parameter, creating an entry point for attackers. SQL Injection vulnerabilities are a common security concern in software applications that interact with relational databases. This emphasizes the importance of input validation and query parameterization in software development.
The technical details of this vulnerability involve the 'post' parameter in the SQL queries processed by the plugin. The vulnerable endpoint is the WordPress admin-ajax.php, where the data is POSTed during AJAX requests associated with the plugin's operations. Attackers can craft malicious payloads that append or modify existing database queries to extract unauthorized data. The verification involves confirming successful execution of time-based SQL statements that cause delays in server response, indicative of query execution. This specific vulnerability is confirmed by the duration check and expected HTTP responses after the payload is delivered. Consequently, developers are encouraged to deploy patches or implement robust input validation techniques.
The possible effects of exploiting the SQL Injection vulnerability in the Likes and Dislikes Plugin include unauthorized data retrieval, which can compromise the integrity and confidentiality of stored data. Website credential theft, unauthorized database modification, and complete data exposure are other potential consequences. If the attack is executed in a severe manner, it could result in data loss or database corruption. Additionally, the exploitation of this vulnerability can facilitate further attacks, such as privilege escalation or unauthorized actions on the system. It represents a critical security risk, especially for sites that store sensitive data.
REFERENCES
- https://plugins.trac.wordpress.org/browser/inprosysmedia-likes-dislikes-post/trunk/inprosysmedia-likes-dislikes-post.php#L76
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ad19205d-d355-45d8-be5b-f8005459a8c7?source=cve
- https://github.com/XiaomingX/data-cve-poc/blob/main/2025/CVE-2025-5287/README.md