VYPR
High severity8.5NVD Advisory· Published Jan 8, 2026· Updated Apr 27, 2026

CVE-2025-22713

CVE-2025-22713

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in vanquish WooCommerce Orders & Customers Exporter woocommerce-orders-ei allows SQL Injection.This issue affects WooCommerce Orders & Customers Exporter: from n/a through <= 5.4.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in WooCommerce Orders & Customers Exporter plugin (≤5.4) allows unauthenticated attackers to execute arbitrary SQL commands, risking data theft.

Vulnerability

Overview

CVE-2025-22713 is an SQL injection vulnerability inection vulnerability in the WordPress plugin WooCommerce Orders & Customers Exporter (versions up to and including 5.4). The plugin fails to properly neutralize special elements used in SQL commands, allowing an attacker to inject malicious SQL queries. This flaw is classified as a classic SQL injection (CWE-89) and has been assigned a CVSS v3 score of 8.5 (High) [1].

Exploitation

The vulnerability can be exploited without authentication, making it accessible to any remote attacker. By crafting specially crafted input to the plugin's export functionality, an attacker can inject arbitrary SQL commands into the database query. The attack does not require any special privileges or user interaction, and it can be performed over HTTP [1].

Impact

Successful exploitation allows an attacker to directly interact with the underlying WordPress database. This could lead to the theft of sensitive information, including user credentials, personal data, and order details. Given the plugin's widespread use, this vulnerability is considered highly dangerous and is expected to be used in mass-exploit campaigns targeting thousands of websites [1].

Mitigation

The vendor has released a patched version; users are strongly advised to update the plugin immediately. If an update is not possible, it is recommended to contact the hosting provider or a web developer for web developer assistance to implement temporary workarounds or disable the plugin until a fix can be applied [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.