VYPR
High severity8.5NVD Advisory· Published Dec 9, 2025· Updated Apr 27, 2026

CVE-2025-67518

CVE-2025-67518

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LambertGroup Accordion Slider PRO accordion_slider_pro allows Blind SQL Injection.This issue affects Accordion Slider PRO: from n/a through <= 1.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Blind SQL injection in Accordion Slider PRO <= 1.2 allows unauthenticated database manipulation via unsanitized SQL parameters.

Vulnerability

Overview

The Accordion Slider PRO WordPress plugin, up to version 1.2, suffers from a blind SQL injection vulnerability stemming from improper neutralization of special elements used in an SQL command [1]. This flaw allows an attacker to injectors to pass arbitrary SQL statements through unsanitized input fields, enabling unfettered access to the underlying database [1].

Exploitation and

Attack Surface

Exploitation requires no authentication, making the attack surface broad and accessible to unauthenticated remote attackers [1]. The vulnerable parameter is not explicitly disclosed, but the flaw is classified as a classic blind SQL injection, meaning an attacker can infer database contents through true/false responses or time delays [1]. The plugin's widespread use makes it a target for mass-exploit campaigns [1].

Impact

A successful attacker can directly interact with the database, leading to data theft (sensitive user information, credentials, site configuration) and potential lateral movement within the hosting environment [1]. The CVSS v3 score of 8.5 (High) reflects the high confidentiality and integrity impact without requiring user interaction or privileges [1].

Mitigation

The vendor has released version 1.3 which patches the vulnerability [1]. Users are strongly advised to update immediately or enable auto-updates for vulnerable plugins via Patchstack [1]. For those unable to update, consulting a hosting provider or developer is recommended as a workaround [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.