Description
The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to SQL Injection via the ‘automationId’ parameter in all versions up to, and including, 3.5.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2025-03-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Impact

The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin contains an unauthenticated SQL injection flaw. The flaw arises when a user supplies an unescaped 'automationId' value, which the plugin concatenates directly into an SQL query. This allows an attacker to append arbitrary SQL statements and extract sensitive data from the database, as the plugin fails to perform proper query parameterization or escaping.

Affected Systems

Affected systems are all WordPress installations using the FunnelKit Automations plugin up to and including version 3.5.1. The flaw is present in the API endpoint handled by class-bwfan-api-get-automation-dynamic-coupon.php. Any site running the vulnerable version of this plugin is susceptible to exploitation.

Risk and Exploitability

With a CVSS score of 7.5, the vulnerability is considered high severity. The EPSS score of less than 1% indicates a low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Attackers would need only a simple HTTP request to the vulnerable endpoint, meaning the attack vector is remote and unauthenticated, leveraging the lack of authentication checks around the 'automationId' parameter.

Generated by OpenCVE AI on April 22, 2026 at 01:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the FunnelKit Automations plugin to the latest available version from the vendor, as no specific patch version is listed in the CVE.
  • Restrict access to the endpoint that processes the 'automationId' parameter by configuring the web server or firewall to allow only authenticated or whitelisted requests.
  • Implement input validation or parameterized database queries on the 'automationId' value to prevent injection attacks.

Generated by OpenCVE AI on April 22, 2026 at 01:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7277 The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to SQL Injection via the ‘automationId’ parameter in all versions up to, and including, 3.5.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
History

Mon, 24 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 22 Mar 2025 12:45:00 +0000

Type Values Removed Values Added
Description The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to SQL Injection via the ‘automationId’ parameter in all versions up to, and including, 3.5.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit <= 3.5.1 - Unauthenticated SQL Injection via 'automationId'
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:05:23.518Z

Reserved: 2025-03-10T23:41:54.871Z

Link: CVE-2025-2186

cve-icon Vulnrichment

Updated: 2025-03-24T13:48:20.426Z

cve-icon NVD

Status : Deferred

Published: 2025-03-22T13:15:35.683

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-2186

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T02:00:05Z

Weaknesses