First published: Thu Apr 10 2025(Updated: )
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CardGate CardGate Payments for WooCommerce allows Blind SQL Injection. This issue affects CardGate Payments for WooCommerce: from n/a through 3.2.1.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
CardGate Payments | <=3.2.1 | |
WordPress CardGate Payments for WooCommerce | <=3.2.1 |
Update the WordPress CardGate Payments for WooCommerce wordpress plugin to the latest available version (at least 3.2.2).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-32119 is classified as critical due to its potential for blind SQL injection attacks.
To fix CVE-2025-32119, update the CardGate Payments for WooCommerce plugin to version 3.2.2 or later.
All versions of CardGate Payments for WooCommerce from n/a through 3.2.1 are affected by CVE-2025-32119.
CVE-2025-32119 allows attackers to perform blind SQL injection, potentially compromising the database on vulnerable WordPress sites.
Yes, CVE-2025-32119 can be exploited remotely without authentication, making it particularly dangerous.