Description
The Wp tabber widget plugin for WordPress is vulnerable to SQL Injection via the 'wp-tabber-widget' shortcode in all versions up to, and including, 4.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2025-10-15
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection via shortcode allowing extraction of sensitive database information
Action: Patch it
AI Analysis

Impact

The Wp tabber widget plugin for WordPress is vulnerable to SQL injection through the wp‑tabber‑widget shortcode. Because the plugin does not properly escape the user supplied parameter and does not prepare the existing SQL query, an attacker who has logged in with a Contributor role or higher can inject additional SQL statements. The injected queries can retrieve confidential data from the database, including user credentials, content, or other sensitive information. This flaw is classified as CWE‑89 and represents a direct breach of confidentiality for the affected site.

Affected Systems

All installations of the Wp tabber widget plugin version 4.0 and earlier on WordPress sites are affected. The only vendor listed is gopiplushotmailcom, with the product name Wp tabber widget.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is that an authenticated user with Contributor-level access inserts malicious code into the shortcode, which the plugin then executes as part of a broader SQL query. Successful exploitation would grant the attacker read access to any data that the database user privileges allow, posing a significant confidentiality risk. Because this requires authentication, the risk is limited to sites where Contributor accounts are not properly segmented or where role permissions are overly generous.

Generated by OpenCVE AI on April 22, 2026 at 22:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Wp tabber widget plugin to the most recent version.
  • If an upgrade is not immediately possible, disable the plugin or remove the wp‑tabber‑widget shortcode from pages used by contributors.
  • Adjust the database user used by WordPress to have the least privileges needed for the site, reducing the damage if an injection succeeds.

Generated by OpenCVE AI on April 22, 2026 at 22:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 24 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 15 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Oct 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Wp tabber widget plugin for WordPress is vulnerable to SQL Injection via the 'wp-tabber-widget' shortcode in all versions up to, and including, 4.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Wp tabber widget <= 4.0 - Authenticated (Contributor+) SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:45:09.667Z

Reserved: 2025-09-19T14:03:42.432Z

Link: CVE-2025-10730

cve-icon Vulnrichment

Updated: 2025-10-15T19:39:13.158Z

cve-icon NVD

Status : Deferred

Published: 2025-10-15T09:15:41.540

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10730

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T22:15:26Z

Weaknesses