Description
The Yawave plugin for WordPress is vulnerable to SQL Injection via the 'lbid' parameter in all versions up to, and including, 2.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2025-02-25
Score: 7.5 High
EPSS: 1.0% Low
KEV: No
Impact: Unauthenticated SQL Injection
Action: Apply Patch
AI Analysis

Impact

The Yawave WordPress plugin is vulnerable to an unauthenticated SQL injection via the 'lbid' parameter in all versions up to 2.9.1, due to unsanitised input and lack of query preparation. Attackers can append arbitrary SQL statements to the existing query, allowing extraction of sensitive database contents. This flaw is a classic input validation weakness identified as CWE‑89, and it can compromise the confidentiality and integrity of site data.

Affected Systems

Affected systems include any WordPress site running the Yawave plugin, specifically versions 2.9.1 or older. The plugin is distributed under the product identifier yawave. Users who have installed these versions are at risk until they upgrade or remove the plugin.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.5, indicating a high severity, and an EPSS score of 1 %, meaning that exploitation likelihood is currently low but not negligible. It is not listed in the CISA KEV catalog. The problem can be exploited by any unauthenticated user via a crafted HTTP request targeting the shortcode.liveblog.php endpoint, showing that the attack vector is network accessible and does not require administrative access.

Generated by OpenCVE AI on April 21, 2026 at 22:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Yawave plugin to a version newer than 2.9.1
  • If an upgrade is not immediately possible, uninstall or disable the Yawave plugin from the WordPress installation
  • Deploy a Web Application Firewall rule to detect and block suspicious SQL injection attempts against the 'lbid' parameter

Generated by OpenCVE AI on April 21, 2026 at 22:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-5072 The Yawave plugin for WordPress is vulnerable to SQL Injection via the 'lbid' parameter in all versions up to, and including, 2.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
History

Fri, 28 Feb 2025 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Yawave
Yawave yawave
CPEs cpe:2.3:a:yawave:yawave:*:*:*:*:*:wordpress:*:*
Vendors & Products Yawave
Yawave yawave

Tue, 25 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 25 Feb 2025 07:15:00 +0000

Type Values Removed Values Added
Description The Yawave plugin for WordPress is vulnerable to SQL Injection via the 'lbid' parameter in all versions up to, and including, 2.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Yawave <= 2.9.1 - Unauthenticated SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:58:49.208Z

Reserved: 2025-02-24T18:48:05.918Z

Link: CVE-2025-1648

cve-icon Vulnrichment

Updated: 2025-02-25T14:14:33.993Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-25T07:15:18.670

Modified: 2025-02-28T01:30:32.830

Link: CVE-2025-1648

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:30:06Z

Weaknesses