
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2025-10175 affects WP Links Page WordPress plugin versions up to 4.9.6. This is an authenticated SQL injection vulnerability that can be exploited by users with Subscriber level access or higher. The vulnerability was discovered and publicly disclosed on October 10, 2025 (Wordfence Intel). The vulnerability has been assigned a CVSS score of 6.5, indicating a medium severity level.
The vulnerability is classified as an authenticated SQL injection, which means attackers need at least a Subscriber level account to exploit it. The CVSS score of 6.5 (Medium) suggests that while the vulnerability requires authentication, it could still pose a significant risk to affected systems (Wordfence Intel).
As an SQL injection vulnerability, successful exploitation could allow authenticated attackers to manipulate or extract data from the WordPress site's database. This could potentially lead to unauthorized access to sensitive information stored in the database (Wordfence Intel).
The plugin has been temporarily closed as of October 9, 2025, pending a full security review. Users are advised to disable and remove the plugin until a security fix is available (WordPress Plugin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."