The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-4396

CVE-2025-4396: Relevanssi WordPress Plugin SQLi Vulnerability

CVE-2025-4396 is a time-based SQL injection vulnerability in the Relevanssi WordPress search plugin that allows unauthenticated attackers to extract database information. This article covers technical details, affected versions, and mitigations.

Updated: January 22, 2026

CVE-2025-4396 Overview

The Relevanssi – A Better Search plugin for WordPress contains a time-based SQL Injection vulnerability in the cats and tags query parameters. This vulnerability affects all versions up to and including 4.24.4 (Free) and 2.27.4 (Premium). The flaw exists due to insufficient escaping of user-supplied parameters and a lack of adequate preparation on existing SQL queries. This allows unauthenticated attackers to append additional SQL queries to extract sensitive information from the WordPress database.

Critical Impact

Unauthenticated attackers can exploit this SQL injection vulnerability to extract sensitive data from the WordPress database, potentially including user credentials, personal information, and site configuration data.

Affected Products

  • Relevanssi – A Better Search (Free) versions up to and including 4.24.4
  • Relevanssi – A Better Search (Premium) versions up to and including 2.27.4
  • WordPress installations using affected Relevanssi plugin versions

Discovery Timeline

  • May 13, 2025 - CVE-2025-4396 published to NVD
  • May 13, 2025 - Last updated in NVD database

Technical Details for CVE-2025-4396

Vulnerability Analysis

This SQL injection vulnerability (CWE-89) affects the Relevanssi WordPress search plugin's taxonomy query handling functionality. The vulnerability is classified as a time-based SQL injection, meaning attackers can infer database content by observing response timing differences when injecting conditional SQL statements. The attack can be executed over the network without authentication, and while it does not allow data modification, it enables complete extraction of confidential database contents.

The vulnerable code paths are located in two key files within the plugin: search-tax-query.php and search.php. The cats and tags query parameters used for filtering search results by categories and tags do not properly sanitize user input before incorporating it into SQL queries. WordPress provides the $wpdb->prepare() function specifically to prevent SQL injection by properly escaping and type-casting query parameters, but this critical security measure is not adequately implemented in the affected code paths.

Root Cause

The root cause of this vulnerability is insufficient input validation and improper use of SQL query preparation. The plugin fails to properly escape user-supplied values from the cats and tags query parameters before incorporating them into database queries. Instead of using WordPress's built-in prepared statement functionality ($wpdb->prepare()), the code directly concatenates user input into SQL strings, creating an injection point that attackers can exploit.

Attack Vector

The attack vector is network-based and requires no authentication or user interaction. An attacker can craft malicious HTTP requests containing SQL injection payloads in the cats or tags search parameters. By exploiting the time-based SQL injection technique, attackers send queries with conditional time delays (using functions like SLEEP() in MySQL). When the injected condition is true, the database pauses execution, and the attacker can observe the response delay to extract data one character or bit at a time.

The vulnerable code can be examined in the Relevanssi Search Tax Query Code and Relevanssi Search Code files in the WordPress plugin repository. These references show the exact locations where user input is processed without adequate sanitization.

Detection Methods for CVE-2025-4396

Indicators of Compromise

  • Unusual database query execution times or timeout errors in WordPress logs
  • HTTP requests to search endpoints containing SQL syntax in cats or tags parameters (e.g., SLEEP, BENCHMARK, UNION, single quotes, comment sequences)
  • Repeated search requests from the same IP with incrementally modified parameter values
  • Database server CPU spikes correlating with search endpoint access

Detection Strategies

  • Implement Web Application Firewall (WAF) rules to detect SQL injection patterns in query parameters
  • Monitor access logs for requests containing SQL keywords or time-based injection payloads in the cats and tags parameters
  • Enable MySQL slow query logging to identify abnormally long-running queries originating from WordPress
  • Deploy intrusion detection signatures for time-based SQL injection techniques

Monitoring Recommendations

  • Configure real-time alerting for SQL injection patterns in web server logs
  • Monitor database performance metrics for anomalous query execution times
  • Review WordPress audit logs for suspicious search activity patterns
  • Implement rate limiting on search endpoints to slow automated extraction attempts

How to Mitigate CVE-2025-4396

Immediate Actions Required

  • Update Relevanssi (Free) to a version newer than 4.24.4 immediately
  • Update Relevanssi (Premium) to a version newer than 2.27.4 immediately
  • If updates are not immediately available, consider temporarily disabling the plugin
  • Review WordPress database for signs of data exfiltration or unauthorized access

Patch Information

Security updates addressing this vulnerability should be obtained directly from the plugin author or the WordPress plugin repository. Administrators should check the Wordfence Vulnerability Report for the latest patch status and version information. Always verify the integrity of downloaded updates and test patches in a staging environment before production deployment.

Workarounds

  • Temporarily disable the Relevanssi plugin until a patched version is available
  • Implement WAF rules to block requests containing SQL injection patterns in the cats and tags parameters
  • Restrict access to search functionality to authenticated users only if business requirements permit
  • Consider using WordPress's native search functionality as a temporary alternative
bash
# Configuration example - Block suspicious search parameters in Apache .htaccess
# Add to your WordPress root .htaccess file
RewriteEngine On
RewriteCond %{QUERY_STRING} (cats|tags)=.*(\%27|\'|\%22|\"|\%3D|=|sleep|benchmark|union) [NC]
RewriteRule ^.*$ - [F,L]

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeSQLI

  • Vendor/TechWordpress

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability21.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-89
  • Technical References
  • Relevanssi Search Tax Query Code

  • Relevanssi Search Tax Query Code

  • Relevanssi Search Code

  • Relevanssi Search Code

  • Wordfence Vulnerability Report
  • Related CVEs
  • CVE-2023-54359: WordPress Adivaha Travel Plugin SQLI Flaw

  • CVE-2026-3781: WordPress Attendance Manager SQLi Flaw

  • CVE-2026-39466: Broken Link Checker SQL Injection Flaw

  • CVE-2026-1865: WordPress User Registration SQLi Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English