Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools
  • Home
  • Vulnerabilities
  • CVE Alert: CVE-2025-11177 – tbenyon – External Login
  • Vulnerabilities

CVE Alert: CVE-2025-11177 – tbenyon – External Login

October 16, 2025

CVE-2025-11177

HIGHNo exploitation known

The External Login plugin for WordPress is vulnerable to SQL Injection via the ‘log’ parameter in all versions up to, and including, 1.11.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database when a PostgreSQL or MSSQL database is configured as the external authentication database.

CVSS v3.1 (7.5)
Vendor
tbenyon
Product
External Login
Versions
* lte 1.11.2
CWE
CWE-89, CWE-89 Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Published
2025-10-15T08:25:54.794Z
Updated
2025-10-15T14:54:46.845Z
References
https://www.wordfence.com/threat-intel/vulnerabilities/id/488f1a2f-01c8-40cf-b52f-d707271105f5?source=cve
https://plugins.trac.wordpress.org/browser/external-login/tags/1.11.2/login/db.php#L153

AI Summary Analysis

Risk verdict

High risk: unauthenticated remote SQL injection via the External Login plugin could expose sensitive data; currently no active exploitation detected.

Why this matters

Because no authentication is required and the vector is network-accessible, an attacker could read data from the external authentication database (PostgreSQL or MSSQL). A breach could lead to data loss, regulatory exposure, and reputational damage for sites relying on this integration.

Most likely attack path

Remote, unauthenticated access is possible over the network; no user interaction required. An attacker can inject additional SQL through the log parameter, potentially exfiltrating data if the external DB is accessible and misconfigured; lateral movement is limited by database permissions.

Who is most exposed

WordPress sites using External Login with external DB authentication, especially in cloud or hosted environments where the DB is exposed to the web.

Detection ideas

  • Anomalous database queries or errors tied to the log parameter in logs.
  • Unusual spikes in data retrieval from the external DB.
  • Repeated attempts with crafted payloads targeting SQL syntax errors.
  • WAF/IDS alerts signalling SQL injection attempts on the plugin endpoint.

Mitigation and prioritisation

  • Upgrade to a patched release (or latest available version) and verify vendor guidance.
  • If patching is delayed, disable the plugin or switch to an alternative authentication method; restrict external DB access to trusted networks.
  • Apply input validation and, where possible, prepared statements or parameterized queries in the integration layer.
  • Enable monitoring and alerts for anomalous DB access patterns; review access controls and DB permissions.
  • Plan a change-management window for patch deployment and validation.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features
Buy Me A Coffee Patreon
Tags: CVE, cve-2025-11177, external-login, OSINT, tbenyon, threatintel

Post navigation

Previous: CVE Alert: CVE-2025-10293 – nexist – Keyy Two Factor Authentication (like Clef)
Next: CVE Alert: CVE-2025-11722 – ikhodal – Woocommerce Category and Products Accordion Panel

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-11722 – ikhodal – Woocommerce Category and Products Accordion Panel

October 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-41430 – F5 – BIG-IP

October 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10743 – maycorolbuche1 – Outdoor

October 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-11177 – tbenyon – External Login

October 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10754 – geolocationtechnology – DocoDoco Store Locator

October 16, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel