xPromoter Vulnerability (Medium) – CVE-2025-68053

xPromoter Vulnerability (Medium) – CVE-2025-68053

by | Feb 26, 2026 | Plugins

Attack Vectors

The xPromoter WordPress plugin (slug: top_bar_promoter) has an authenticated SQL Injection vulnerability affecting versions up to and including 1.3.4 (CVE: CVE-2025-68053). The severity is rated Medium with a CVSS 3.1 score of 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).

Because this issue requires Contributor-level access or higher, a typical real-world path is a stolen or abused WordPress user account (for example, a compromised contributor account, credential reuse, phishing, or an insider threat). Once logged in, an attacker can send crafted requests to the affected functionality without needing additional user interaction.

Security Weakness

The vulnerability is caused by insufficient escaping of a user-supplied parameter and a lack of proper SQL query preparation. In practical terms, this can allow an authenticated attacker to append malicious SQL to existing database queries.

This type of weakness is especially concerning in business environments because WordPress databases often store sensitive operational information beyond web content (such as user records, contact form submissions, integration tokens, or other data added by plugins), depending on how the site is configured.

Technical or Business Impacts

The primary risk described for this issue is extraction of sensitive information from the database. While the vulnerability does not indicate direct integrity or availability impacts (per the CVSS vector), the confidentiality impact is high, which can translate into business-level exposure.

Potential business impacts include regulatory or contractual reporting obligations if personal data is accessed, loss of customer trust, disruption to marketing operations during incident response, and increased costs related to forensic investigation, legal review, and remediation. For organizations with compliance requirements, this can also trigger internal control reviews and vendor/security attestations.

Remediation: Update xPromoter to version 1.3.5 or a newer patched release. In addition, review who has Contributor (or higher) access, enforce strong authentication practices, and ensure monitoring is in place for unusual admin/contributor activity.

Reference (source): Wordfence vulnerability record.

Similar Attacks

SQL injection has been a recurring issue across many web platforms. Well-known examples include CVE-2014-3704 (Drupal “Drupalgeddon” SQL injection) and CVE-2017-8917 (Joomla! SQL injection), both of which demonstrate how database query weaknesses can lead to large-scale data exposure when systems are not patched promptly.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers