Description
The Custom 404 Pro plugin for WordPress is vulnerable to time-based SQL Injection via the ‘path’ parameter in all versions up to, and including, 3.12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2025-10-11
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection leading to data exposure
Action: Restrict Access
AI Analysis

Impact

The WordPress plugin Custom 404 Pro contains a time‑based SQL injection flaw in the path parameter used by administrative helpers. The value is not sanitized and is incorporated directly into an SQL statement that is not prepared. This allows an attacker who is already authenticated with Administrator level or higher to append additional SQL queries, potentially extracting sensitive data from the database.

Affected Systems

Custom 404 Pro plugin for WordPress, all releases up to and including version 3.12.0. No other products are affected according to the vendor information.

Risk and Exploitability

The CVSS score is 4.9, reflecting medium severity for data confidentiality impact. The EPSS score is below 1%, indicating a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Because an attacker must first be authenticated with Administrator privileges, the attack surface is limited to trusted users. The time‑based nature of the injection could also be detected through response latency, further reducing the practical exploitation risk.

Generated by OpenCVE AI on April 20, 2026 at 21:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Remove or disable the Custom 404 Pro plugin until a vendor patch is released.
  • Restrict administrative access to the plugin’s functionality to only verified administrators and review permissions regularly.
  • Increase monitoring of database activity for unusual query patterns, and consider applying a web application firewall rule to block suspicious SQL payloads.

Generated by OpenCVE AI on April 20, 2026 at 21:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Kunalnagar
Kunalnagar custom 404 Pro
Wordpress
Wordpress wordpress
Vendors & Products Kunalnagar
Kunalnagar custom 404 Pro
Wordpress
Wordpress wordpress

Tue, 14 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 11 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
Description The Custom 404 Pro plugin for WordPress is vulnerable to time-based SQL Injection via the ‘path’ parameter in all versions up to, and including, 3.12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Custom 404 Pro <= 3.12.0 - Authenticated (Administrator+) SQL Injection via `path` Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Kunalnagar Custom 404 Pro
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:29:14.171Z

Reserved: 2025-09-03T13:18:58.667Z

Link: CVE-2025-9947

cve-icon Vulnrichment

Updated: 2025-10-14T18:31:55.643Z

cve-icon NVD

Status : Deferred

Published: 2025-10-11T10:15:44.970

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-9947

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T21:45:18Z

Weaknesses