Description
The Dynamically Display Posts plugin for WordPress is vulnerable to SQL Injection via the 'tax_query' parameter in all versions up to, and including, 1.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2025-10-15
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Data Access via SQL Injection
Action: Patch
AI Analysis

Impact

The Dynamically Display Posts plugin for WordPress contains a critical SQL injection flaw in the 'tax_query' parameter. Malicious actors can craft input that is not properly escaped or bound, allowing them to append additional SQL statements to existing queries. This vulnerability enables unauthenticated attackers to retrieve sensitive data from the WordPress database, potentially exposing content, user credentials, or other confidential information. The weakness is a classic injection flaw quantified as CWE-89.

Affected Systems

WordPress sites that have installed the Dynamically Display Posts plugin in any release version 1.1 or earlier. The attack surface covers all public requests that trigger the plugin’s front‑end logic, as the flaw is present in the database access code used by unauthenticated users.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity, while the EPSS score of less than 1% suggests the likelihood of exploitation is currently low. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an external actor to send a crafted request containing the vulnerable 'tax_query' parameter to a publicly accessible WordPress endpoint that loads the plugin. No prior authentication is required, and the impact is primarily data exfiltration rather than code execution.

Generated by OpenCVE AI on April 21, 2026 at 02:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Dynamically Display Posts to the latest available version that removes the insecure handling of the 'tax_query' parameter.
  • If an immediate upgrade is not feasible, disable or uninstall the plugin to eliminate the attack vector until a fix is applied.
  • Configure a web application firewall or similar filtering rule to block or sanitize suspicious input patterns targeting the 'tax_query' parameter, reducing the risk of exploitation while remediation steps are undertaken.

Generated by OpenCVE AI on April 21, 2026 at 02:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 15 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Oct 2025 07:45:00 +0000

Type Values Removed Values Added
Description The Dynamically Display Posts plugin for WordPress is vulnerable to SQL Injection via the 'tax_query' parameter in all versions up to, and including, 1.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Dynamically Display Posts <= 1.1 - Unauthenticated SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:16:29.759Z

Reserved: 2025-10-08T14:18:37.524Z

Link: CVE-2025-11501

cve-icon Vulnrichment

Updated: 2025-10-15T16:09:01.430Z

cve-icon NVD

Status : Deferred

Published: 2025-10-15T08:15:33.847

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11501

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T02:30:25Z

Weaknesses