CVE-2025-66095
Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows SQL Injection.This issue affects KiviCare: from n/a through <= 3.6.13.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SQL injection in KiviCare <=3.6.13 allows unauthenticated attackers to execute arbitrary SQL commands, risking data theft and website compromise.
Vulnerability
Overview
CVE-2025-66095 describes an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in the Iqonic Design KiviCare plugin for WordPress (kivicare-clinic-management-system). The flaw exists because user-supplied input is not properly sanitized before being used in SQL queries, allowing an attacker to inject malicious SQL code. All versions from n/a through 3.6.13 are affected [1].
Exploitation and
Attack Surface
This vulnerability is remotely exploitable without authentication, making it particularly dangerous for mass exploitation campaigns targeting thousands of WordPress sites. An attacker needs only network access to send crafted HTTP requests containing SQL injection payloads. The reference explicitly warns that such vulnerabilities are used to attack websites regardless of traffic size or popularity [1].
Impact
A successful SQL injection allows the attacker to directly interact with the underlying database. This can lead to exfiltration of sensitive data (such as user credentials, patient records in a clinic context), modification or deletion of data, and in some cases, further compromise of the WordPress installation [1]. The CVSS v3 score of 8.5 (High) reflects the potential severity and ease of exploitation.
Mitigation
The vendor has released version 3.6.14 which fixes the SQL injection. Users are strongly advised to update immediately. Patchstack users can enable auto-updates for vulnerable plugins. If immediate updating is not possible, a hosting provider or web developer should be consulted for alternative mitigations [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=3.6.13
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.