Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
|  EUVD | EUVD-2025-16842 | The File Provider WordPress plugin through 1.2.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Wed, 04 Jun 2025 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Dimdavid Dimdavid file Provider | |
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:dimdavid:file_provider:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products | Dimdavid Dimdavid file Provider | 
Wed, 04 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | cvssV3_1 
 
 | 
Wed, 04 Jun 2025 06:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The File Provider WordPress plugin through 1.2.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection | |
| Title | File Provider <= 1.2.3 - Unauthenticated SQLi | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-06-04T13:22:41.426Z
Reserved: 2025-05-12T12:51:13.599Z
Link: CVE-2025-4578
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-06-04T13:22:31.809Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-06-04T06:15:21.673
Modified: 2025-06-04T20:07:45.857
Link: CVE-2025-4578
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.