Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-11391 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Unauthenticated Time-Based Blind SQL Injection in PPOM Plugin. πŸ’₯ **Consequences**: Attackers can extract database data (user creds, site config) without detection.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-434 (Unrestricted Upload of File with Dangerous Type) is listed, but the **PoC reveals SQL Injection**. ⚠️ **Flaw**: Lack of input validation/sanitization in plugin hooks (`inc/hooks.php`).…

Q3Who is affected? (Versions/Components)

🎯 **Affected**: WordPress Plugin: **PPOM – Product Addons & Custom Fields for WooCommerce**. πŸ“¦ **Versions**: **<= 33.0.15**. 🏒 **Vendor**: ThemeIsle. If you use this plugin on WooCommerce, you are at risk.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Hackers Can**: Execute arbitrary SQL commands. πŸ“Š **Data Access**: Read sensitive DB tables (users, passwords, options). πŸ”„ **Privileges**: Unauthenticated access means **zero login needed**.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. πŸ”“ **Auth**: Unauthenticated (No login required). 🌐 **Network**: Network-accessible (AV:N). πŸ–±οΈ **UI**: None required (UI:N). Easy to exploit via automated scripts.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Exploit Available**: **YES**. πŸ“‚ **PoC**: Public on GitHub (`aritlhq/CVE-2025-11391`). πŸš€ **Status**: Time-based blind SQLi PoC is ready. Wild exploitation is likely imminent given the low barrier.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check WP Plugin list for 'PPOM'. 2. Verify version **<= 33.0.15**. 3. Scan for `inc/hooks.php` modifications. πŸ› οΈ **Tools**: Use WPScan or manual version check.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: **YES**. πŸ†• **Patch Version**: **33.0.16**. πŸ“ **Action**: Update plugin immediately to v33.0.16 or later. The vendor has acknowledged and patched the issue.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: 1. **Deactivate** the plugin if not essential. 2. **Restrict Access**: Block plugin endpoints via WAF. 3. **Input Filtering**: Manually sanitize inputs in `hooks.php` (advanced).…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: **P1**. CVSS Score is High (likely 9.0+ based on vector). Unauthenticated SQLi is a top-tier threat. Patch **NOW** to prevent data breach.