SB2025031835 - Multiple vulnerabilities in WPSchoolPress plugin for WordPress



SB2025031835 - Multiple vulnerabilities in WPSchoolPress plugin for WordPress

Published: March 18, 2025

Security Bulletin ID SB2025031835
Severity
Medium
Patch available
NO
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) SQL injection (CVE-ID: CVE-2025-1670)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data in the "cid" parameter. A remote user can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


2) Missing Authorization (CVE-ID: CVE-2025-1668)

The vulnerability allows a remote attacker to bypass authorization checks.

The vulnerability exists due to a missing capability check on the wpsp_DeleteUser() function. A remote user can delete arbitrary user accounts.


3) Authorization bypass through user-controlled key (CVE-ID: CVE-2025-1667)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to a missing capability check on the wpsp_UpdateTeacher() function. A remote user can update arbitrary user details including email and gain elevated privileges on the system.


4) SQL injection (CVE-ID: CVE-2025-1669)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data in the "addNotify" action. A remote user can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.