CVE-2025-13077

افزونه · افزونه پیامک ووکامرس فوق حرفه ای (جدید) payamito sms woocommerce plugin for WordPress

A high-severity vulnerability has been identified in the "payamito sms woocommerce" WordPress plugin, which could allow an unauthenticated attacker to steal sensitive information from the website's da.

Executive summary

A high-severity vulnerability has been identified in the "payamito sms woocommerce" WordPress plugin, which could allow an unauthenticated attacker to steal sensitive information from the website's database. Successful exploitation could lead to a significant data breach, compromising user credentials, customer data, and other confidential information. Organizations are urged to apply the recommended updates immediately to mitigate the risk of data exfiltration and potential reputational damage.

Vulnerability

The plugin is vulnerable to a time-based blind SQL Injection. An attacker can send specially crafted SQL queries via the 'columns' parameter in an HTTP request. The server's response time will vary depending on whether the injected query condition is true or false, allowing the attacker to infer the contents of the database one character at a time. This technique enables an unauthenticated attacker to systematically extract sensitive data, such as user tables, passwords, and other confidential information, without needing direct access to the system.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.5. A successful exploit could have severe consequences for the business, including a complete compromise of database confidentiality. Potential impacts include the theft of sensitive customer information (personally identifiable information, order details), administrator credentials, and proprietary business data. Such a data breach could lead to significant reputational damage, loss of customer trust, financial loss, and potential regulatory fines under data protection laws like GDPR or CCPA.

Remediation

Immediate Action: Immediately update the "payamito sms woocommerce" plugin to the latest patched version available from the vendor. If the plugin is not essential for business operations, consider deactivating and removing it entirely to eliminate the attack surface. After updating, review all WordPress security settings to ensure they adhere to best practices.

Proactive Monitoring: Monitor web server and application logs for suspicious requests containing SQL syntax, particularly those targeting the vulnerable 'columns' parameter. Look for an unusual number of long-running queries or patterns consistent with time-based attacks. A Web Application Firewall (WAF) should be configured to log and block SQL injection attempts.

Compensating Controls: If immediate patching is not feasible, deploy a properly configured Web Application Firewall (WAF) with rulesets designed to detect and block SQL injection attacks. Implement strict input validation on the web server to sanitize user-supplied data before it is processed by the application. Restrict access to the website's administrative dashboard to trusted IP addresses only.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 7.5) and the potential for complete database compromise, we strongly recommend that all organizations using the affected "payamito sms woocommerce" plugin apply the necessary updates immediately. While there is no current evidence of active exploitation, the risk of a data breach is significant. Prioritize patching this vulnerability to protect sensitive company and customer data from unauthorized access and exfiltration.