CVE Alert: CVE-2025-9172 – pierrelannoy – Vibes

CVE-2025-9172

HIGHNo exploitation known

The Vibes plugin for WordPress is vulnerable to time-based SQL Injection via the ‘resource’ parameter in all versions up to, and including, 2.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CVSS v3.1 (7.5)
Vendor
pierrelannoy
Product
Vibes
Versions
* lte 2.2.0
CWE
CWE-89, CWE-89 Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Published
2025-08-26T03:24:49.126Z
Updated
2025-08-26T03:24:49.126Z

AI Summary Analysis

Risk verdict

High risk: unauthenticated remote SQL injection could exfiltrate sensitive data from affected sites.

Why this matters

Impact focuses on confidentiality: attackers can read data from the database without credentials, potentially exposing customer information or internal records. With no user interaction required, a broad attacker base could probe exposed WordPress deployments and leverage data leakage for further attacks.

Most likely attack path

An attacker can reach the vulnerable endpoint over the internet and inject crafted input into a user-controlled parameter, exploiting insufficient input sanitisation. The vulnerability requires no authentication, and only confidentiality is affected, making it feasible to automate broad scans and data harvesting without elevating privileges.

Who is most exposed

Sites hosting WordPress with the affected plugin, especially self-hosted or on shared hosting with publicly accessible WP endpoints and delayed patching. Organisations with slow update cadences or limited WAF coverage are particularly at risk.

Detection ideas

  • Monitor for time-based SQL payloads in requests to the plugin endpoints (abnormally long response times indicative of sleep-based delays).
  • Look for unusual query patterns or SQL keywords in user-supplied parameters within access logs.
  • Spike/detection of repeated access attempts from diverse IPs targeting the plugin URL.
  • Correlate slow responses with specific resource parameter values in firewall or application logs.
  • WAF alerts for SQL injection patterns on WordPress paths.

Mitigation and prioritisation

  • Apply the latest patched release or disable the plugin until patched; verify compatibility in staging first.
  • Implement temporary WAF/IPS rules to block time-based SQL injection patterns in the relevant parameter.
  • Enforce strict input validation and use parameterised queries in any custom code or plugins.
  • Schedule patching with change-management plans and test for regressions; monitor post-deployment to confirm containment.
  • Consider ongoing vulnerability management: enable automatic updates where feasible and review plugin risk in annual risk assessments.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.