VYPR
Medium severity4.9NVD Advisory· Published Nov 25, 2025· Updated Apr 15, 2026

CVE-2025-13370

CVE-2025-13370

Description

The ProjectList plugin for WordPress is vulnerable to time-based SQL Injection via the 'id' parameter in all versions up to, and including, 0.3.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Editor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The ProjectList WordPress plugin ≤0.3.0 has a time-based SQL injection in the 'id' parameter, allowing authenticated Editor+ users to extract sensitive data.

Description

The ProjectList plugin for WordPress is vulnerable to time-based SQL Injection in all versions up to and including 0.3.0. The vulnerability resides in the 'id' parameter, where insufficient escaping and lack of prepared statements allow attackers to inject malicious SQL code. This type of injection enables querying the database asynchronously by observing response timing differences.

Exploitation

Conditions The attack requires authenticated access with at least Editor-level privileges. The vulnerable parameter is user-supplied, and no special network position is needed beyond being able to interact with the plugin's administrative interface. Since the plugin has been closed on November 20, 2025 due to a security problem [1], exploitation may be possible on sites still running it.

Impact

An authenticated attacker can append additional SQL queries to existing ones, extracting sensitive information such as usernames, hashed passwords, or other protected data from the WordPress database. Time-based blind injection allows data exfiltration even without direct output.

Mitigation

The plugin is closed and no longer available for download [1]. Users should immediately remove or replace the plugin. No patched version exists; the only remediation is to stop using ProjectList entirely.

References
  1. ProjectList

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.