Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-59557 β€” AI Deep Analysis Summary

CVSS 9.3 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SQL Injection (SQLi) in **Learts Addons** plugin. <br>πŸ’₯ **Consequences**: Attackers can manipulate database queries, leading to **data theft**, **data corruption**, or **server compromise**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-89**: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Vendor**: ThemeMove. <br>πŸ“¦ **Product**: WordPress Plugin **Learts Addons**. <br>πŸ“‰ **Affected Versions**: **< 1.7.5**. <br>βœ… **Safe**: Version 1.7.5 and above are patched.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Privileges**: No authentication required (PR:N). <br>πŸ’Ύ **Data**: High Confidentiality Impact (C:H). Attackers can **read sensitive database data** (user credentials, site config).…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. <br>πŸ”“ **Auth**: None required (PR:N). <br>πŸ–±οΈ **UI**: None required (UI:N). <br>🌐 **Network**: Remote (AV:N). <br>🎯 **Complexity**: Low (AC:L). Easy to exploit remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exp**: No PoC provided in the data (pocs: []). <br>πŸ“’ **Wild Exp**: Likely low currently due to lack of public exploits, but the **CVSS Vector** indicates it is highly exploitable if a PoC is developed.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: <br>1. Check WordPress Admin > Plugins. <br>2. Look for **Learts Addons**. <br>3. Verify version number. <br>4. If **< 1.7.5**, you are vulnerable. <br>5.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. <br>πŸ“¦ **Patch**: Update **Learts Addons** to version **1.7.5** or higher. <br>πŸ”— **Source**: Patchstack database confirms the fix in v1.7.5.

Q9What if no patch? (Workaround)

πŸ›‘ **Workaround**: <br>1. **Deactivate** the plugin immediately if update is not possible. <br>2. **Delete** the plugin if not needed. <br>3.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. <br>πŸ“Š **CVSS**: 7.5 (High). <br>⚑ **Priority**: Patch immediately. <br>🎯 **Reason**: Remote, unauthenticated, low complexity, high data impact. Do not delay.