
Cloud Vulnerability DB
A community-led vulnerabilities database
The Product Filter by WBW plugin for WordPress contains a time-based SQL Injection vulnerability (CVE-2025-2317) that affects all versions up to and including 2.7.9. The vulnerability was discovered and disclosed on April 4, 2025, and is exploitable through the filtersDataBackend parameter. This security issue affects WordPress installations using the vulnerable plugin versions (NVD CVE).
The vulnerability stems from insufficient escaping of user-supplied parameters and inadequate preparation of SQL queries in the filtersDataBackend parameter. This allows unauthenticated attackers to append additional SQL queries to existing ones. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating network accessibility, low attack complexity, and no required privileges or user interaction (NVD CVE).
The successful exploitation of this vulnerability allows attackers to extract sensitive information from the database. The high confidentiality impact rating in the CVSS score indicates that unauthorized access to sensitive data is the primary concern (NVD CVE).
Users should update their Product Filter by WBW plugin to a version newer than 2.7.9 once available. Until then, website administrators should consider disabling the plugin if possible or implementing additional security measures such as Web Application Firewalls to filter malicious requests (NVD CVE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."