Description
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to blind and time-based SQL Injections via the rid and search parameters in all versions up to, and including, 5.9.4.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2025-03-22
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection that allows data extraction
Action: Apply Patch
AI Analysis

Impact

The ProfileGrid – User Profiles, Groups and Communities plugin contains blind and time‑based SQL injection vulnerabilities in the rid and search parameters. Authenticated users with Subscriber role or higher can inject and execute arbitrary SQL statements by appending them to these user‑supplied inputs. This flaw aligns with CWE‑89, and the description indicates attackers could retrieve sensitive data from the database via the injection points.

Affected Systems

WordPress sites that use the Metagauss ProfileGrid plugin, versions up to and including 5.9.4.7.

Risk and Exploitability

The CVSS score of 6.5 reflects a moderate severity, while the EPSS score of less than 1 % indicates a very low likelihood of exploitation at this time. The vulnerability is not listed in CISA’s KEV catalog. An attacker would need authenticated access, typically through a standard login that grants at least Subscriber privileges, and would then manipulate the rid or search fields in plugin requests. Given the lack of public proof‑of‑concept exploits, the chance of widespread impact remains limited, but the potential for data disclosure makes the risk noteworthy.

Generated by OpenCVE AI on April 28, 2026 at 03:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the ProfileGrid plugin to a version newer than 5.9.4.7, which removes the vulnerable query paths.
  • If an immediate upgrade is not possible, limit or disable the use of the rid and search parameters for Subscriber+ users, or add custom code that sanitizes these inputs before they reach the database.
  • Implement or refine web‑application firewall rules that detect and block typical SQL injection payloads on URLs or form fields associated with the ProfileGrid plugin.

Generated by OpenCVE AI on April 28, 2026 at 03:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7195 The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to blind and time-based SQL Injections via the rid and search parameters in all versions up to, and including, 5.9.4.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
History

Thu, 27 Mar 2025 01:15:00 +0000

Type Values Removed Values Added
First Time appeared Metagauss
Metagauss profilegrid
CPEs cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*
Vendors & Products Metagauss
Metagauss profilegrid

Mon, 24 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 22 Mar 2025 04:45:00 +0000

Type Values Removed Values Added
Description The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to blind and time-based SQL Injections via the rid and search parameters in all versions up to, and including, 5.9.4.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title ProfileGrid – User Profiles, Groups and Communities <= 5.9.4.7 - Authenticated (Subscriber+) SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Metagauss Profilegrid
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:36:45.495Z

Reserved: 2025-01-26T23:25:36.704Z

Link: CVE-2025-0723

cve-icon Vulnrichment

Updated: 2025-03-24T14:51:55.323Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-22T05:15:38.053

Modified: 2025-03-27T00:47:32.027

Link: CVE-2025-0723

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T03:30:19Z

Weaknesses