First published: Sat Mar 22 2025(Updated: )
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to blind and time-based SQL Injections via the rid and search parameters in all versions up to, and including, 5.9.4.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
ProfileGrid – User Profiles, Groups and Communities | <=5.9.4.7 | |
Metagauss ProfileGrid | <5.9.4.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0723 is rated as a critical severity vulnerability due to the potential for remote code execution through SQL injection.
To fix CVE-2025-0723, upgrade the ProfileGrid – User Profiles, Groups and Communities plugin to version 5.9.4.8 or later.
CVE-2025-0723 affects all versions of the ProfileGrid – User Profiles, Groups and Communities plugin up to and including version 5.9.4.7.
CVE-2025-0723 can be exploited through blind and time-based SQL injection using the rid and search parameters.
Yes, having an outdated version of the ProfileGrid plugin exposes your website to the exploitation risks associated with CVE-2025-0723.