CVE-2025-13192

WordPress · Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers plugin

The Popup builder with Gamification plugin for WordPress is vulnerable to SQL Injection via REST API endpoints. This allows attackers to execute arbitrary SQL commands.

Executive summary

A critical SQL Injection vulnerability in the Popup builder with Gamification WordPress plugin allows attackers to compromise the site's database through various REST API endpoints.

Vulnerability

This vulnerability is a generic SQL Injection flaw located within multiple REST API endpoints. An attacker can manipulate input parameters to execute unauthorized queries against the WordPress database, likely without requiring high-level authentication.

Business impact

A successful SQL injection attack can lead to the full disclosure of sensitive database records, including user credentials, customer data, and site configurations. The CVSS score of 8.2 indicates a high severity, as this could result in a complete site takeover and significant data privacy violations.

Remediation

Immediate Action: Update the "Popup builder with Gamification" plugin to the latest version immediately. If no update is available, deactivate and remove the plugin.

Proactive Monitoring: Review database logs for unusual queries containing SQL keywords like UNION, SELECT, or SLEEP, and monitor for unauthorized administrative user creation.

Compensating Controls: Deploy a Web Application Firewall (WAF) with generic SQL injection protection rules to filter malicious REST API requests.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The severity of this SQL injection flaw cannot be overstated, as it provides a direct path to database compromise. Immediate application of the vendor's patch is the only effective way to mitigate this risk and protect sensitive organizational data.