CVE-2025-1702
Description
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the 'search' parameter in all versions up to, and including, 2.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unauthenticated time-based SQL injection in Ultimate Member WordPress plugin up to 2.10.0 allows attackers to extract sensitive database information via the search parameter.
Vulnerability
Overview
CVE-2025-1702 is a time-based SQL injection vulnerability found in the Ultimate Member plugin for WordPress, affecting all versions up to and including 2.10.0. The flaw exists in the plugin's member directory search functionality, where the 'search' parameter is insufficiently escaped and the underlying SQL query lacks adequate preparation [1]. This allows an attacker to inject malicious SQL code that gets appended to existing queries [2].
Exploitation
Method
An unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to the member directory search endpoint, injecting SQL syntax into the 'search' parameter. Because the plugin does not properly filter or sanitize input, and the query construction does not use prepared statements, the injected payload is executed by the database [2]. The exploit is time-based, meaning the attacker can infer information by observing response delays caused by SQL functions such as SLEEP() [2].
Impact
Successful exploitation enables an attacker to extract sensitive information from the WordPress database, including but not limited to user credentials, password hashes, and other private data stored by the plugin or site. Since the vulnerability is exploitable without authentication, any public-facing installation of the plugin is at risk [1][2].
Mitigation
The vulnerability has been patched in the development branch, as shown by a commit that adds additional SQL injection filters to the prepare_search() method [2]. Users are urged to update Ultimate Member to version 2.10.1 or later as soon as it becomes available. As of the publication date, no evidence of exploitation in the wild has been confirmed, but administrators should apply the patch proactively.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/ultimatemember/ultimatemember/pull/1654/commits/74647d42cc8d63f5d4f687efcd0792c246c23039nvd
- plugins.trac.wordpress.org/browser/ultimate-member/trunk/includes/core/class-member-directory.phpnvd
- plugins.trac.wordpress.org/browser/ultimate-member/trunk/includes/core/class-member-directory.phpnvd
- plugins.trac.wordpress.org/changeset/3249862/nvd
- wordpress.org/plugins/ultimate-member/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/34adbae5-d615-4f8d-a845-6741d897f06cnvd
News mentions
0No linked articles in our index yet.