Description
The Code Clone plugin for WordPress is vulnerable to time-based SQL Injection via the ‘snippetId’ parameter in all versions up to, and including, 0.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2025-03-22
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection (Administrator+)
Action: Patch
AI Analysis

Impact

The vulnerability exists in the Code Clone plugin for WordPress and is a time‑based SQL injection that targets the snippetId parameter in the admin snippet‑edit.php file. Because the plugin does not escape the user‑supplied value or properly prepare the query, an attacker who is already authenticated with Administrator rights can inject additional SQL statements. This ability allows the attacker to read sensitive data from the database and compromise the integrity of the stored information. The weakness is a classic application typo‑injection flaw.

Affected Systems

All users of the Code Clone plugin by Allhart, with affected versions up to and including 0.9. WordPress sites running this plugin version are at risk if an administrator account is compromised. The vulnerability is limited to environments where the plugin’s administrative interface is accessible.

Risk and Exploitability

The CVSS base score of 4.9 indicates a moderate severity. Current EPSS submissions show a very low exploitation probability (< 1 %) and the issue is not listed in the CISA KEV catalog, suggesting that large‑scale exploitation is unlikely at present. However, because the flaw requires administrator privileges, any site with weaker access controls or an exposed admin account could be vulnerable. The risk is considered moderate, but because the attack vector depends on an authenticated user, the best practice is to patch as soon as the update becomes available.

Generated by OpenCVE AI on April 21, 2026 at 21:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Code Clone to the latest plugin version, which removes the snippetId injection flaw.
  • Revoke or lock any unnecessary administrator accounts and enforce the principle of least privilege for remaining users.
  • If an immediate update is not possible, remove or disable the snippet‑edit.php file from the server or apply a server‑side block to limit access to that file, thereby preventing the injection path.

Generated by OpenCVE AI on April 21, 2026 at 21:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7189 The Code Clone plugin for WordPress is vulnerable to time-based SQL Injection via the ‘snippetId’ parameter in all versions up to, and including, 0.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
History

Mon, 24 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 22 Mar 2025 06:45:00 +0000

Type Values Removed Values Added
Description The Code Clone plugin for WordPress is vulnerable to time-based SQL Injection via the ‘snippetId’ parameter in all versions up to, and including, 0.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Code Clone <= 0.9 - Authenticated (Administrator+) SQL Injection via snippetId Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:11:15.664Z

Reserved: 2025-03-17T21:37:30.036Z

Link: CVE-2025-2478

cve-icon Vulnrichment

Updated: 2025-03-24T13:18:01.172Z

cve-icon NVD

Status : Deferred

Published: 2025-03-22T07:15:24.963

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-2478

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:00:26Z

Weaknesses