Wolmart Core Vulnerability (High) – CVE-2025-69337

Wolmart Core Vulnerability (High) – CVE-2025-69337

by | Feb 25, 2026 | Plugins

Attack Vectors

CVE-2025-69337 is a High-severity (CVSS 7.5) vulnerability affecting the Wolmart Core WordPress plugin (wolmart-core) in versions up to and including 1.9.6.

The issue is an unauthenticated SQL Injection, meaning an attacker can target the site over the network without needing a login and without user interaction. In practical terms, this increases exposure because the attack can be executed remotely and at scale against internet-facing sites.

Security Weakness

According to the published advisory, Wolmart Core versions up to 1.9.6 are vulnerable due to insufficient escaping of a user-supplied parameter and a lack of sufficient preparation on an existing SQL query. This combination can allow an attacker to append additional SQL to a database query.

The reported impact is focused on data extraction: the attacker may be able to use the injection to extract sensitive information from the WordPress database. (CVSS indicates high confidentiality impact, with no stated integrity or availability impact.)

Technical or Business Impacts

For business leaders, the core risk is unauthorized exposure of data stored in the site database. Depending on what your WordPress instance stores, this could include customer or lead information, operational data, or other records that become sensitive in aggregate.

Potential business impacts include regulatory and contractual exposure (e.g., privacy obligations if personal data is involved), brand and trust damage, and incident response costs (forensics, legal review, notifications, and heightened monitoring). Even if the website remains online, a confidentiality-focused breach can still trigger material reporting and compliance workflows.

Remediation: Update Wolmart Core to version 1.9.7 or a newer patched version, as recommended by the advisory. Reference: Wordfence vulnerability record. CVE record: CVE-2025-69337.

Similar Attacks

SQL injection has a long history of being used to access sensitive data from customer-facing systems. Examples include:

TalkTalk (2015 cyber attack) — widely reported as involving SQL injection and resulting in significant regulatory and reputational impact.

Heartland Payment Systems (2008 data breach) — a major breach where attackers used SQL injection techniques as part of the compromise.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers