CVE-2025-67962

AIOSEO · AIOSEO Multiple Products (specifically the Broken Link Checker plugin)

A high-severity SQL Injection vulnerability has been identified in the AIOSEO Broken Link Checker plugin.

Executive summary

A high-severity SQL Injection vulnerability has been identified in the AIOSEO Broken Link Checker plugin. This flaw could allow an unauthenticated attacker to manipulate the website's database, potentially leading to unauthorized access, theft of sensitive information, or a complete compromise of the affected website.

Vulnerability

The vulnerability exists because the Broken Link Checker plugin does not properly sanitize user-supplied input before it is used to construct a database query. An attacker can submit a specially crafted request containing malicious SQL commands to a vulnerable component of the plugin. This injected code is then executed by the backend database, allowing the attacker to bypass security measures and interact directly with the database to read, modify, or delete data.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.6. Successful exploitation could have a significant business impact, including a data breach of sensitive customer or user information, unauthorized modification of website content, or deletion of critical data. Such an incident could lead to severe reputational damage, loss of customer trust, financial losses from business disruption, and potential regulatory fines for non-compliance with data protection standards.

Remediation

Immediate Action:

  • Patch: Apply the security patches provided by the vendor (AIOSEO) immediately to all affected systems.
  • Review Access Controls: Audit and review the permissions of the database user account associated with the web application. Ensure it operates under the principle of least privilege, with access restricted only to the necessary database schemas and tables.
  • Enable Logging: Enable and centralize detailed database query logging. This will aid in detecting potential exploitation attempts and support forensic investigations if a compromise is suspected.

Proactive Monitoring:

  • Monitor Web Application Firewall (WAF) and web server logs for suspicious requests containing SQL keywords and characters (e.g., UNION, SELECT, ', --, ;).
  • Analyze database logs for unusual, complex, or long-running queries originating from the web application, especially those that differ from normal operational patterns.
  • Set up alerts for any unauthorized changes to website files, user accounts, or critical database tables.

Compensating Controls:

  • If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with a robust SQL injection rule set to block malicious requests before they reach the application.
  • Implement stricter input validation on the web server or application gateway to filter potentially malicious characters and strings.
  • Restrict access to the administrative interface of the affected plugin to trusted IP addresses only.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity of this vulnerability (CVSS 7.6) and the potential for a complete database compromise, organizations are strongly advised to prioritize patching immediately. While this CVE is not currently listed on the CISA KEV list, its critical nature makes it a highly attractive target for attackers. The "Remediation Plan" outlined above should be implemented without delay to prevent potential data breaches and protect the integrity of the organization's web assets.