This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Unauthenticated Time-Based Blind SQL Injection in PPOM Plugin. π₯ **Consequences**: Attackers can extract database data (user creds, site config) without detection.β¦
π‘οΈ **Root Cause**: CWE-434 (Unrestricted Upload of File with Dangerous Type) is listed, but the **PoC reveals SQL Injection**. β οΈ **Flaw**: Lack of input validation/sanitization in plugin hooks (`inc/hooks.php`).β¦
π― **Affected**: WordPress Plugin: **PPOM β Product Addons & Custom Fields for WooCommerce**. π¦ **Versions**: **<= 33.0.15**. π’ **Vendor**: ThemeIsle. If you use this plugin on WooCommerce, you are at risk.
π **Threshold**: **LOW**. π **Auth**: Unauthenticated (No login required). π **Network**: Network-accessible (AV:N). π±οΈ **UI**: None required (UI:N). Easy to exploit via automated scripts.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Exploit Available**: **YES**. π **PoC**: Public on GitHub (`aritlhq/CVE-2025-11391`). π **Status**: Time-based blind SQLi PoC is ready. Wild exploitation is likely imminent given the low barrier.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: 1. Check WP Plugin list for 'PPOM'. 2. Verify version **<= 33.0.15**. 3. Scan for `inc/hooks.php` modifications. π οΈ **Tools**: Use WPScan or manual version check.β¦
β **Fixed**: **YES**. π **Patch Version**: **33.0.16**. π **Action**: Update plugin immediately to v33.0.16 or later. The vendor has acknowledged and patched the issue.
Q9What if no patch? (Workaround)
π§ **No Patch Workaround**: 1. **Deactivate** the plugin if not essential. 2. **Restrict Access**: Block plugin endpoints via WAF. 3. **Input Filtering**: Manually sanitize inputs in `hooks.php` (advanced).β¦
π₯ **Urgency**: **CRITICAL**. π¨ **Priority**: **P1**. CVSS Score is High (likely 9.0+ based on vector). Unauthenticated SQLi is a top-tier threat. Patch **NOW** to prevent data breach.