VYPR
Medium severity4.9NVD Advisory· Published Mar 19, 2025· Updated Apr 15, 2026

CVE-2025-2511

CVE-2025-2511

Description

The AHAthat Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the 'id' parameter in all versions up to, and including, 1.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The AHAthat Plugin for WordPress (≤1.6) has a time-based SQL Injection flaw in the 'id' parameter enabling authenticated Admin-level attackers to extract sensitive information.

Vulnerability

Description The AHAthat Plugin for WordPress, in versions up to and including 1.6, contains a time-based SQL Injection vulnerability in the id parameter. The issue arises from insufficient escaping on the user-supplied parameter and a lack of prepared statements in the SQL query, allowing arbitrary SQL to be injected into existing queries [1]. This is a classic SQL injection flaw that can be exploited through crafted input to the vulnerable parameter.

Exploitation and

Prerequisites Exploitation requires authenticated access with Administrator-level privileges or above. The attacker must be able to supply a malicious id parameter value, which is not properly sanitized before being used in a SQL query. Since the injection is time-based, the attacker can infer information about the database by observing response delays, bypassing the need for direct error messages [1].

Impact

A successful attack allows an authenticated administrator to append additional SQL queries into the existing ones, enabling extraction of sensitive information from the WordPress database. This could include user credentials, session tokens, or other confidential data stored in the database [1].

Mitigation

The plugin has been closed as of December 6, 2024, due to the security issue, and is no longer available for download [1]. Users should immediately remove the plugin from their WordPress installations and seek alternative solutions. There is no patched version available, as the plugin is discontinued.

References
  1. AHAthat Plugin

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.