First published: Fri Feb 14 2025(Updated: )
Bit Assist plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bit Assist | <=1.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0821 is classified with a high severity due to its potential for time-based SQL Injection attacks.
To fix CVE-2025-0821, update the Bit Assist plugin to the latest version above 1.5.2, as this resolves the SQL injection vulnerability.
CVE-2025-0821 affects all versions of the Bit Assist plugin up to and including 1.5.2.
The impact of CVE-2025-0821 allows attackers to exploit time-based SQL Injection vulnerabilities, potentially leading to unauthorized data access.
The vendor for CVE-2025-0821 is Bit Assist, which develops the vulnerable Bit Assist plugin for WordPress.