CVE-2025-2511
Description
The AHAthat Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the 'id' parameter in all versions up to, and including, 1.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The AHAthat Plugin for WordPress (≤1.6) has a time-based SQL Injection flaw in the 'id' parameter enabling authenticated Admin-level attackers to extract sensitive information.
Vulnerability
Description The AHAthat Plugin for WordPress, in versions up to and including 1.6, contains a time-based SQL Injection vulnerability in the id parameter. The issue arises from insufficient escaping on the user-supplied parameter and a lack of prepared statements in the SQL query, allowing arbitrary SQL to be injected into existing queries [1]. This is a classic SQL injection flaw that can be exploited through crafted input to the vulnerable parameter.
Exploitation and
Prerequisites Exploitation requires authenticated access with Administrator-level privileges or above. The attacker must be able to supply a malicious id parameter value, which is not properly sanitized before being used in a SQL query. Since the injection is time-based, the attacker can infer information about the database by observing response delays, bypassing the need for direct error messages [1].
Impact
A successful attack allows an authenticated administrator to append additional SQL queries into the existing ones, enabling extraction of sensitive information from the WordPress database. This could include user credentials, session tokens, or other confidential data stored in the database [1].
Mitigation
The plugin has been closed as of December 6, 2024, due to the security issue, and is no longer available for download [1]. Users should immediately remove the plugin from their WordPress installations and seek alternative solutions. There is no patched version available, as the plugin is discontinued.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.