WBW Product Table Pro Vulnerability (High) – CVE-2025-31059

WBW Product Table Pro Vulnerability (High) – CVE-2025-31059

by | Feb 10, 2026 | Plugins

Attack Vectors

WBW Product Table PRO (slug: woo-producttables-pro) versions up to and including 2.2.6 contain a High-severity (CVSS 7.5) vulnerability that can be exploited remotely over the internet. Because the issue is unauthenticated (no login required) and has a low attack complexity (CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), it is especially relevant for sites where the plugin is publicly reachable.

The vulnerability (CVE-2025-31059) is an SQL Injection condition, where an attacker can abuse a user-supplied parameter to manipulate how database queries run. In practical terms, an external attacker can attempt to extract information from the WordPress database without needing credentials.

Security Weakness

CVE-2025-31059 affects the WBW Product Table PRO plugin due to insufficient escaping of user-supplied input and a lack of sufficient preparation in an existing SQL query. This combination can allow attackers to append additional SQL logic onto legitimate queries.

SQL Injection issues are high-risk for business websites because the database often contains information beyond “just content” (for example, user accounts, email addresses, order data, and operational records depending on what the site stores). The published advisory specifically notes the risk of extracting sensitive information from the database.

Technical or Business Impacts

Data exposure risk: The CVSS rating indicates high confidentiality impact. If exploited, attackers may be able to extract sensitive database information, creating potential notification obligations, customer trust damage, and legal/compliance costs—particularly for organizations handling regulated data.

Brand and revenue impact: Even without obvious site downtime, data disclosure events can trigger reputational harm, customer churn, lost pipeline, and increased scrutiny from partners and auditors. Marketing and executive teams often feel this impact first through reputation management, increased inbound concerns, and stalled conversions.

Compliance and governance impact: For Compliance, CFO, and leadership teams, an unauthenticated vulnerability with a public CVE can become a material risk if left unpatched, especially when it can be exploited over the network without user interaction.

Recommended action: Update WBW Product Table PRO to version 2.2.7 or a newer patched version as the primary remediation. Track this as a high-priority patch due to the “no login required” nature of the issue and the potential for sensitive information exposure.

Similar Attacks

SQL Injection is a common web application attack pattern that has been used in many real-world incidents. Examples include:

FTC settlement involving SQL injection and data exposure (2011)

Equifax 2017 cybersecurity incident (public disclosure site)

Sony Pictures breach discussion referencing SQL injection (analysis)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers