Impact
The Ultimate Member plugin contains a time‑based SQL Injection flaw in its search parameter that allows attackers to append arbitrary SQL statements. The vulnerability results from insufficient escaping of user input and the lack of a prepared statement, enabling unauthenticated users to inject and execute SQL against the database. The core weakness is an input validation error identified as CWE‑89.
Affected Systems
WordPress sites that have the Ultimate Member plugin at version 2.9.1 or any earlier release are affected. This plugin provides user profiles, registration, login, member directories, and content restriction features and is distributed through the official WordPress repository.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity. The EPSS score of less than 1% suggests a very low yet non‑zero likelihood of exploitation today, and the flaw is not listed in the CISA KEV catalog, so no confirmed exploitation campaign exists. Based on the description, it is inferred that the attack vector is an unauthenticated HTTP request to the search endpoint, which, if accessed, could let an attacker extract sensitive data from the database through the injected query.
OpenCVE Enrichment
EUVD