Vulnerability Description
The wpForo Forum plugin for WordPress is vulnerable to error‐based or time-based SQL Injection via the get_members() function in all versions up to, and including, 2.4.8 due to missing integer validation on the 'offset' and 'row_count' parameters. The function blindly interpolates 'row_count' into a 'LIMIT offset,row_count' clause using esc_sql() rather than enforcing numeric values. MySQL 5.x’s grammar allows a 'PROCEDURE ANALYSE' clause immediately after a LIMIT clause. Unauthenticated attackers controlling 'row_count' can append a stored‐procedure call, enabling error‐based or time‐based blind SQL injection that can be used to extract sensitive information from the database.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/wpforo/tags/2.4.5/classes/Members.php
- https://plugins.trac.wordpress.org/browser/wpforo/tags/2.4.9/classes/Members.php
- https://wordpress.org/plugins/wpforo/#developers
- https://www.wordfence.com/threat-intel/vulnerabilities/id/bc406e8a-c4eb-45c3-a53
FAQ
What is CVE-2025-4203?
CVE-2025-4203 is a vulnerability with a CVSS score of 7.5 (HIGH). The wpForo Forum plugin for WordPress is vulnerable to error‐based or time-based SQL Injection via the get_members() function in all versions up to, and including, 2.4.8 due to missing integer validat...
How severe is CVE-2025-4203?
CVE-2025-4203 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-4203?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.