CVE-2025-10726
WPRecovery · WPRecovery plugin for WordPress
A critical vulnerability has been identified in the WPRecovery plugin for WordPress that allows for unauthenticated SQL Injection.
Executive summary
A critical vulnerability has been identified in the WPRecovery plugin for WordPress that allows for unauthenticated SQL Injection. An attacker could exploit this flaw to execute arbitrary commands on the website's database, potentially leading to the theft of sensitive data, website defacement, or a full system compromise. This vulnerability poses a severe risk to any organization using the affected plugin, threatening the confidentiality, integrity, and availability of their website and its underlying data.
Vulnerability
The WPRecovery plugin is vulnerable to a SQL Injection attack. This is due to insufficient input sanitization and escaping of the user-supplied data[id] parameter before it is used in a database query. A remote, unauthenticated attacker can craft a malicious request containing specially formatted SQL commands within this parameter, which the application will then execute against the database. This allows the attacker to read, modify, or delete database information, and potentially escalate privileges or achieve remote code execution depending on the database configuration.
Business impact
This vulnerability is rated as critical with a CVSS score of 9.1, posing a severe risk to the organization. Successful exploitation could lead to a significant data breach, including the theft of sensitive customer information, user credentials, and proprietary business data. The potential consequences include direct financial loss, severe reputational damage, and regulatory fines under data protection laws like GDPR or CCPA. Furthermore, an attacker could deface the website, disrupt business operations, or use the compromised server as a pivot point to launch further attacks against the internal network.
Remediation
Immediate Action: Immediately update the WPRecovery plugin for WordPress to the latest version (greater than 2.0) that addresses this vulnerability. Prioritize patching on all internet-facing systems to eliminate the exposure.
Proactive Monitoring: Actively monitor web server and Web Application Firewall (WAF) logs for any requests containing suspicious patterns in the data[id] parameter. Look for common SQL injection indicators such as UNION, SELECT, ' OR '1'='1, and other SQL keywords or functions. Monitor for any unusual database activity, high CPU load on the database server, or unauthorized changes to website content.
Compensating Controls: If patching cannot be performed immediately, deploy a Web Application Firewall (WAF) with a strict ruleset designed to block SQL injection attacks. Restrict administrative access to the WordPress site to trusted IP addresses only. Ensure the database user account used by the WordPress application operates with the principle of least privilege to limit the potential impact of a successful exploit.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical severity (CVSS 9.1) of this vulnerability and the high likelihood of exploitation, we strongly recommend that all affected instances of the WPRecovery plugin be patched immediately. Although this vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities (KEV) catalog, its high impact and the ease of exploitation make it an attractive target for attackers. Organizations must treat the remediation of this vulnerability as a top priority to prevent a potentially devastating security incident.