CVE-2025-15268
Infility Global · Infility Global plugin for WordPress
The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL Injection via the 'infility_get_data' API action. This allows remote attackers to extract sensitive data.
Executive summary
The Infility Global WordPress plugin contains an unauthenticated SQL Injection vulnerability that allows any remote attacker to access and extract sensitive information from the database.
Vulnerability
This is an unauthenticated SQL Injection vulnerability. The flaw exists in the 'infility_get_data' API action, which fails to properly sanitize user-supplied input before using it in a database query, allowing for arbitrary command execution.
Business impact
Since the exploit requires no authentication, the entire internet can potentially access the underlying WordPress database. This could lead to the theft of PII, administrative credentials, and proprietary site data, justifying the CVSS score of 7.5 and the high-risk classification.
Remediation
Immediate Action: Update the Infility Global plugin to the latest available version. If the plugin is not essential, uninstall it to eliminate the attack surface.
Proactive Monitoring: Audit WordPress access logs for suspicious requests to the 'infility_get_data' action, specifically looking for URL-encoded SQL syntax.
Compensating Controls: Utilize a WAF to block requests to the vulnerable API action that contain suspicious payloads or originate from known malicious IP addresses.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability represents a significant threat to data confidentiality. Administrators must prioritize updating the Infility Global plugin immediately to prevent unauthenticated attackers from dumping the site's database.