CVE-2025-10046
Description
The ELEX WooCommerce Google Shopping (Google Product Feed) plugin for WordPress is vulnerable to SQL Injection via the 'file_to_delete' parameter in all versions up to, and including, 1.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Authenticated SQL injection in ELEX WooCommerce Google Shopping plugin up to 1.4.3 allows admin-level attackers to extract database info via the file_to_delete parameter.
The ELEX WooCommerce Google Shopping (Google Product Feed) plugin for WordPress is vulnerable to SQL injection in all versions up to and including 1.4.3. The vulnerability exists in the CVE-2025-10046 resides in the elex-manage-feed-ajax.php file, where the file_to_delete parameter is directly concatenated into a DELETE SQL query without proper escaping or parameterization [1]. The code uses $wpdb->prepare() incorrectly, applying %1s to the entire query string rather than binding the user-supplied value as a parameter, leaving the query open to injection [1].
Exploitation requires the attacker to be authenticated with Administrator-level access or higher. The vulnerable parameter is passed via POST request to the elex_gpf_manage_feed_delete_file AJAX action, which is protected by a nonce check but does not sanitize the file_to_delete input before using it in the SQL query [1]. An attacker can append arbitrary SQL clauses to the existing DELETE statement, bypassing the insufficient escaping.
Successful exploitation allows an authenticated administrator to extract sensitive information from the WordPress database, such as user credentials, session tokens, or other confidential data stored configuration data. The CVSS v3 base score of 4.9 (Medium) reflects the high privileges required and the potential for data exposure.
As of the publication date (2025-09-06), no patch has been released for version 1.4.3 or earlier. Users are advised to restrict administrator access to trusted individuals and monitor for updates from the plugin vendor. The vulnerability is not currently listed in CISA's Known Exploited Vulnerabilities catalog.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=1.4.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- plugins.svn.wordpress.org/elex-woocommerce-google-product-feed-plugin-basic/tags/1.4.3/includes/elex-manage-feed-ajax.phpnvd
- plugins.trac.wordpress.org/changeset/3342699/elex-woocommerce-google-product-feed-plugin-basic/tags/1.4.4/includes/elex-manage-feed-ajax.phpnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/0afe37bb-fa8a-4e7b-93c6-c44b3fbeb904nvd
News mentions
0No linked articles in our index yet.